Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-6052 (GCVE-0-2025-6052)
Vulnerability from cvelistv5 – Published: 2025-06-13 15:40 – Updated: 2026-05-12 12:02- CWE-190 - Integer Overflow or Wraparound
| URL | Tags |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-6052 | vdb-entryx_refsource_REDHAT |
| https://bugzilla.redhat.com/show_bug.cgi?id=2372666 | issue-trackingx_refsource_REDHAT |
| Vendor | Product | Version | |
|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 |
cpe:/o:redhat:enterprise_linux:10 |
|
| Red Hat | Red Hat Enterprise Linux 10 |
cpe:/o:redhat:enterprise_linux:10 |
|
| Red Hat | Red Hat Enterprise Linux 10 |
cpe:/o:redhat:enterprise_linux:10 |
|
| Red Hat | Red Hat Enterprise Linux 10 |
cpe:/o:redhat:enterprise_linux:10 |
|
| Red Hat | Red Hat Enterprise Linux 10 |
cpe:/o:redhat:enterprise_linux:10 |
|
| Red Hat | Red Hat Enterprise Linux 10 |
cpe:/o:redhat:enterprise_linux:10 |
|
| Red Hat | Red Hat Enterprise Linux 6 |
cpe:/o:redhat:enterprise_linux:6 |
|
| Red Hat | Red Hat Enterprise Linux 7 |
cpe:/o:redhat:enterprise_linux:7 |
|
| Red Hat | Red Hat Enterprise Linux 8 |
cpe:/o:redhat:enterprise_linux:8 |
|
| Red Hat | Red Hat Enterprise Linux 8 |
cpe:/o:redhat:enterprise_linux:8 |
|
| Red Hat | Red Hat Enterprise Linux 8 |
cpe:/o:redhat:enterprise_linux:8 |
|
| Red Hat | Red Hat Enterprise Linux 9 |
cpe:/o:redhat:enterprise_linux:9 |
|
| Red Hat | Red Hat Enterprise Linux 9 |
cpe:/o:redhat:enterprise_linux:9 |
|
| Red Hat | Red Hat Enterprise Linux 9 |
cpe:/o:redhat:enterprise_linux:9 |
|
| Red Hat | Red Hat Enterprise Linux 9 |
cpe:/o:redhat:enterprise_linux:9 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6052",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-13T15:58:19.551063Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-13T15:58:31.440Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"affected": [
{
"defaultStatus": "unknown",
"product": "SIMATIC CN 4100",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-12T12:02:30.756Z",
"orgId": "0b142b55-0307-4c5a-b3c9-f314f3fb7c5e",
"shortName": "siemens-SADP"
},
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-032379.html"
}
],
"x_adpType": "supplier"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "unaffected",
"packageName": "bootc",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "affected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "unaffected",
"packageName": "glycin-loaders",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "unaffected",
"packageName": "loupe",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "affected",
"packageName": "mingw-glib2",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "unaffected",
"packageName": "rpm-ostree",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unaffected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "unaffected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "unaffected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "unaffected",
"packageName": "librsvg2",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "unaffected",
"packageName": "mingw-glib2",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "unaffected",
"packageName": "bootc",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "unaffected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "unaffected",
"packageName": "librsvg2",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "affected",
"packageName": "mingw-glib2",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Philip Withnall for reporting this issue."
}
],
"datePublic": "2025-06-13T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in how GLib\u2019s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u2019t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Low"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-190",
"description": "Integer Overflow or Wraparound",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-07T00:42:01.009Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-6052"
},
{
"name": "RHBZ#2372666",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372666"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-06-13T11:54:49.481Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2025-06-13T00:00:00.000Z",
"value": "Made public."
}
],
"title": "Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring",
"workarounds": [
{
"lang": "en",
"value": "Currently, no mitigation is available for this vulnerability."
}
],
"x_redhatCweChain": "CWE-190: Integer Overflow or Wraparound"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-6052",
"datePublished": "2025-06-13T15:40:38.541Z",
"dateReserved": "2025-06-13T12:02:40.494Z",
"dateUpdated": "2026-05-12T12:02:30.756Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-6052",
"date": "2026-05-14",
"epss": "0.00284",
"percentile": "0.51876"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-6052\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-06-13T16:15:28.230\",\"lastModified\":\"2026-05-12T13:17:28.307\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in how GLib\u2019s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u2019t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en la gesti\u00f3n de memoria de GString de GLib al a\u00f1adir datos a cadenas. Si una cadena ya es muy grande, combinarla con m\u00e1s datos puede causar un desbordamiento oculto en el c\u00e1lculo del tama\u00f1o. Esto hace que el sistema piense que tiene suficiente memoria cuando no la tiene. Como resultado, los datos pueden escribirse m\u00e1s all\u00e1 del l\u00edmite de memoria asignada, lo que provoca fallos o corrupci\u00f3n de memoria.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.75.3\",\"versionEndIncluding\":\"2.84.3\",\"matchCriteriaId\":\"0E728915-6D6F-42BB-95CC-D1B6F6B2DDED\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-6052\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2372666\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-032379.html\",\"source\":\"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-6052\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-13T15:58:19.551063Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-13T15:58:23.496Z\"}}], \"cna\": {\"title\": \"Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring\", \"credits\": [{\"lang\": \"en\", \"value\": \"Red Hat would like to thank Philip Withnall for reporting this issue.\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Low\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"bootc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"glycin-loaders\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"loupe\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"mingw-glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"rpm-ostree\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"librsvg2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"mingw-glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"packageName\": \"bootc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"packageName\": \"glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"packageName\": \"librsvg2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"packageName\": \"mingw-glib2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-06-13T11:54:49.481Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-06-13T00:00:00.000Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-06-13T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/security/cve/CVE-2025-6052\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2372666\", \"name\": \"RHBZ#2372666\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Currently, no mitigation is available for this vulnerability.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in how GLib\\u2019s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\\u2019t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-190\", \"description\": \"Integer Overflow or Wraparound\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-11-07T00:42:01.009Z\"}, \"x_redhatCweChain\": \"CWE-190: Integer Overflow or Wraparound\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-6052\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-07T00:42:01.009Z\", \"dateReserved\": \"2025-06-13T12:02:40.494Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-06-13T15:40:38.541Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
NCSC-2026-0147
Vulnerability from csaf_ncscnl - Published: 2026-05-13 06:33 - Updated: 2026-05-13 06:33Multiple U-Boot versions, including DENX and Das U-Boot through 2019.07-rc4, contain vulnerabilities such as infinite recursion from crafted DOS partition tables causing crashes, alongside numerous CVEs from 2019-2020 affecting bootloader functionality and security.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
U-Boot versions 2016.11-rc1 through 2019.07-rc4 contain multiple security vulnerabilities, including a memcpy() underflow and stack buffer overflow triggered by crafted ext4 filesystems, addressed by CVE-2019-13106 and CVE-2019-13104.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple U-Boot versions from 2016.09 to 2019.07-rc4 contain critical security vulnerabilities including stack buffer overflow and memcpy() underflow related to crafted ext4 filesystems, enabling potential code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including an integer underflow causing unbounded memcpy in net_process_received_packet during UDP parsing, were addressed in Das U-Boot through version 2019.07, alongside fixes for network boot, USB keyboard, and hardware compatibility issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including an unbounded memcpy in Das U-Boot's nfs_readlink_reply function before version 2019.07, were addressed across various updates fixing numerous CVEs and improving hardware compatibility and functionality.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including an unbounded memcpy in the NFSv2 nfs_read_reply function, were addressed in Das U-Boot through updates fixing numerous CVEs and improving hardware support and network boot functionality.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including an unbounded memcpy in Das U-Boot's nfs_readlink_reply function prior to version 2019.07, along with various CVEs affecting network boot, USB, EFI, and descriptor handling, were addressed in recent U-Boot updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including unbounded memcpy in Das U-Boot up to version 2019.07 and various CVEs such as CVE-2019-13106, CVE-2019-11059, and CVE-2020-10648 were addressed in updates improving network boot, USB, and EFI support.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including out-of-bounds read issues in the nfs_read_reply function, were addressed in Das U-Boot up to version 2019.07 through updates fixing numerous CVEs and improving hardware compatibility and functionality.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including an unbounded memcpy in Das U-Boot's nfs_read_reply function and various CVEs affecting network boot, USB, and EFI support on ARM platforms have been addressed in recent U-Boot updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Das U-Boot through version 2019.07 contains multiple security vulnerabilities including an integer underflow causing unbounded memcpy in UDP packet handling, with fixes addressing numerous CVEs from 2019 and 2020 alongside various functional improvements.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Das U-Boot through version 2019.07 contains multiple security vulnerabilities including a stack-based buffer overflow in the nfs_handler reply helper function rpc_lookup_reply, with updates addressing numerous CVEs and various hardware and network boot issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including stack-based buffer overflows in the nfs_lookup_reply function, were addressed in Das U-Boot through version 2019.07, alongside fixes for network boot, USB keyboard, and other hardware-related issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including stack-based buffer overflows in the nfs_readlink_reply function and various CVEs affecting Das U-Boot through version 2019.07 have been addressed in recent U-Boot updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including stack-based buffer overflows and various CVEs affecting Das U-Boot through version 2019.07 have been addressed, alongside fixes for network boot, USB keyboard, and hardware compatibility issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including stack-based buffer overflows and various CVEs affecting Das U-Boot through version 2019.07, have been addressed in updates that also fix network boot, USB keyboard, and hardware compatibility issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple U-Boot updates through 2020 address numerous security vulnerabilities including verified boot bypass, arbitrary code execution, and signature verification flaws, alongside fixes for hardware compatibility and network boot issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
The U-Boot DFU implementation contains a vulnerability where an unchecked USB DFU download length field allows a physical attacker to write beyond a heap buffer by specifying a wLength greater than 4096 bytes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in U-Boot, including buffer overflows and arbitrary out-of-bounds writes during IP packet defragmentation and i2c md command processing, can cause denial of service and memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in U-Boot, including buffer overflows and out-of-bounds writes (CVE-2022-30552, CVE-2022-30790, CVE-2022-30767, CVE-2022-34835), affect components like IP defragmentation and i2c md command, impacting EcoStruxure™ Panel Server Box and other systems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in U-Boot through 2022.07-rc5 include a stack-based buffer overflow in the 'i2c md' command due to an integer signedness error, heap overflow in squashfs, and out-of-bounds writes in IP defragmentation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in QEMU, including heap buffer overflow, use-after-free, NULL pointer dereference, DMA reentrancy, and integer overflow, affect various components such as e1000e NIC emulation and Virtio, leading to denial of service, data disclosure, and potential code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Python updates address critical vulnerabilities including incorrect parsing of email addresses with special characters (CVE-2023-27043), timing side channels in HMAC comparison, and other security flaws affecting versions up to 3.11.12 with extensive fixes and improvements.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
This QEMU update addresses multiple critical security vulnerabilities including heap buffer overflows, use-after-free, NULL pointer dereferences, DMA reentrancy double free, and information leaks affecting various versions and NetApp products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A missing type check in PDF.js font handling in Mozilla Firefox, Firefox ESR, and Thunderbird allows arbitrary JavaScript execution, affecting versions prior to Firefox 126, ESR 115.11, and Thunderbird 115.11.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Linux PAM versions prior to 1.6.0, including the pam_namespace module, contain local denial of service vulnerabilities due to improper handling of mkfifo and missing O_DIRECTORY flag in openat calls, with additional security flaws found in Red Hat OpenShift and IBM QRadar SIEM components.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
SUSE Linux Enterprise 15 SP5 and SP6 kernels, including Confidential Computing, Azure, RT, and Micro variants, received extensive security and non-security updates addressing vulnerabilities across networking, memory, filesystems, device drivers, graphics, and multiple architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple versions of SIPROTEC 5 devices are vulnerable to brute force attacks on insufficiently random session identifiers, allowing unauthenticated remote attackers to gain unauthorized read access to limited web server information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple integer overflow vulnerabilities in Das U-Boot before 2025.01-rc1 affect ext4 symlink resolution, inode size handling, DHCP response processing, and memory allocation, potentially leading to memory corruption and arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Das U-Boot before version 2025.01-rc1 contains multiple integer overflow vulnerabilities in memory allocation, ext4 symlink resolution, and squashfs filesystem handling, potentially leading to crashes or arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security and non-security fixes were applied across various SUSE Linux Enterprise kernels, addressing numerous vulnerabilities in networking, filesystems, Bluetooth, and other kernel subsystems and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple SUSE Linux Enterprise kernels, including versions 12, 15 (SP3 to SP7), Micro 6.x, and Azure variants, received extensive security updates addressing vulnerabilities in Bluetooth, networking, filesystems, USB, SCSI, memory management, and hardware drivers, alongside a Linux kernel TLS decryption refactor to improve processing correctness.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities including a buffer overflow in glibc's assert() function (CVE-2025-0395) affect GNU C Library versions 2.13 to 2.40 and various products like NetApp, Oracle Communications, and HPE Brocade, leading to potential DoS, data modification, and unauthorized access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in MIT Kerberos 5 (CVE-2025-3576) allows spoofing of GSSAPI-protected messages via weaknesses in the RC4-HMAC-MD5 checksum, leading to disabling of weak ciphers like des3-cbc-sha1 and arcfour-hmac-md5 by default.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A set of vulnerabilities in linux-pam's pam_namespace module, including symlink and race condition flaws, allow local users to escalate privileges to root and cause information disclosure or denial of service, addressed by updates changing path handling and disabling user .pam_environment file reading.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in libxml2, including integer overflows, stack buffer overflows, heap use-after-free, type confusion, and null pointer dereferences, can lead to denial of service or crashes, affecting versions up to 2.14.3 and related Oracle products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in GLib's GString, including integer overflow and buffer underflow (CVE-2025-6052, CVE-2025-4373), and a difficult-to-exploit Java SE 8u471-b50 JavaFX flaw can cause crashes, memory corruption, or partial denial of service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A heap use-after-free vulnerability in libxslt caused by attribute type flag corruption leads to memory corruption, crashes, and potential code execution, affecting libxml2, Oracle Java SE 8u471-b50, and Oracle Communications Cloud Native Core Certificate Management with CVSS scores up to 7.8.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities including excessive resource allocation, denial of service, injection flaws, and information disclosure affect Bouncy Castle Java libraries, Oracle Communications, Oracle Siebel CRM, Oracle Fusion Middleware, HPE Telco Service Activator, and various Ubuntu LTS versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple OpenSSL vulnerabilities including CVE-2025-9230 cause out-of-bounds read/write in RFC 3211 KEK unwrap during CMS password-based decryption, potentially leading to crashes or code execution, with moderate severity and low exploit likelihood due to rare usage.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities including a timing side-channel in the SM2 algorithm on 64-bit ARM platforms, memory handling flaws, and denial of service issues affect OpenSSL, Oracle PeopleSoft, Oracle JD Edwards, and NetApp products, with moderate severity in some cases.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple OpenSSL vulnerabilities, including an out-of-bounds read in the HTTP client 'no_proxy' handling causing denial of service, affect various products such as Oracle Essbase, PeopleSoft, JD Edwards, SAP NetWeaver, and NetApp, with severity ranging from low to moderate.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Libxml2 versions up to 2.9.14 contain infinite recursion vulnerabilities in exsltDynMapFunction and catalog parsing functions, causing stack exhaustion and local denial of service without arbitrary memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
GnuTLS versions prior to 3.8.11 contain buffer overflow vulnerabilities in gnutls_pkcs11_token_init and issues with malicious certificates and PKCS11 token labels, leading to denial of service and potential arbitrary code execution (CVE-2025-9820, CVE-2025-14831).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A memory corruption vulnerability in applications parsing specially crafted IPT files may enable attackers to execute arbitrary code within the affected process.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
GnuTLS versions prior to 3.8.12 contain vulnerabilities including CVE-2025-14831, causing denial of service via excessive CPU and memory use from malicious certificates with many name constraints and SANs, and CVE-2025-9820, related to crashes or potential code execution from PKCS11 token label mishandling.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in Go's net/http package allows acceptance of chunked data with bare LF line terminators, enabling HTTP request smuggling when combined with other misinterpreting servers, affecting multiple Go versions prior to 1.23.8 and 1.24.2.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel and AppArmor LSM affecting various architectures and subsystems were fixed, including null pointer dereferences and privilege escalation risks, to enhance system security and prevent local attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple SUSE Linux Enterprise kernels, including 15 SP6, 15 SP7, and Micro 6.x versions, received extensive security and non-security updates addressing vulnerabilities in networking, filesystems, drivers, CPU cache initialization, AMD processors, and various kernel subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including use-after-free flaws and memory corruption in WebKitGTK, Safari 18.5, and Oracle Java SE JavaFX were fixed through improved memory handling and updates addressing crashes, data exfiltration, and remote code execution risks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple SUSE Linux Enterprise and Micro kernel versions received extensive security updates addressing numerous vulnerabilities across CPU cache initialization, AMD processors, filesystems including btrfs, drivers, and various kernel subsystems, alongside many non-security bug fixes and improvements.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple updates to SUSE Linux Enterprise kernels, including 15 SP6, SP7, Micro, Azure, Confidential Computing, and RT variants, addressed numerous security vulnerabilities and bugs across diverse subsystems such as media, networking, tracing, filesystems, drivers, and CPU architectures including AMD processors and the VMSCAPE flaw.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and non-security bugs affecting various Linux kernel subsystems, including CPU cache initialization flaws, AMD processor data leakage, and a Linux kernel crash on RaptorLake CPUs, were fixed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel, including a f2fs filesystem inode sanity check fix, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue, were addressed across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel, including atomicity issues in the mptcp subsystem, CPU cache initialization flaws, and AMD processor data leaks, were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update fixed multiple critical vulnerabilities including out-of-bounds access in cgroup local storage via BPF, AppArmor LSM flaws, AMD CPU microcode loading issues, and the VMSCAPE branch predictor isolation vulnerability across various architectures and subsystems.
CWE-125 - Out-of-bounds Read| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel, including race conditions in the mptcp subsystem, CPU cache initialization flaws, and AMD processor data leaks, were fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including the VMSCAPE branch predictor isolation flaw and CPU cache initialization issues, were addressed in various Linux kernel versions across SUSE Linux Enterprise and Linux Micro products, with fixes spanning numerous architectures, subsystems, and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers—including arm64 stack switching, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor flaw—were fixed across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including stack buffer overflows, CPU cache initialization flaws, and the VMSCAPE branch predictor isolation issue, were fixed across various Linux kernel components and SUSE Linux Enterprise products to enhance system security.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update fixed multiple security vulnerabilities including out-of-boundary access in the f2fs filesystem, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including the media: venus driver, CPU cache initialization, AMD processors, and numerous drivers, were addressed through extensive patches in SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including AMD processors, uvcvideo driver, AppArmor module, and branch predictor isolation (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions to address out-of-bounds reads, privilege escalation, data leakage, and system integrity issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including a race condition in ptdump and the VMSCAPE flaw in branch predictor isolation, were addressed across SUSE Linux Enterprise and Micro kernels from 15 SP6 to 16.0 and 6.2.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates for SUSE Linux Enterprise and Micro versions address numerous security vulnerabilities and non-security bugs across various subsystems including networking, filesystems, drivers, AMD processor issues, and kernel panic fixes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel architectures and subsystems, including a NULL pointer dereference in net/sched ets, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue, were fixed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel across various SUSE Linux Enterprise versions and architectures were fixed, including issues in fbdev, Bluetooth, networking, filesystems, device drivers, AMD processors, virtualization, and memory management.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, architectures, and AMD processors—including race conditions, use-after-free errors, CPU cache initialization flaws, and branch predictor isolation issues—were fixed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems and architectures, including AMD CPU flaws, pNFS layout issues, and the VMSCAPE branch predictor isolation flaw, were addressed across SUSE Linux Enterprise and Micro kernel versions with extensive patches.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting AMD processors, Linux kernel subsystems, and the VMSCAPE flaw in branch predictor isolation were fixed across SUSE Linux Enterprise and Micro kernels, addressing issues like null pointer dereferences, race conditions, use-after-free, and memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting AMD processors and various Linux kernel subsystems—including memory management, networking, USB, SCSI, and CPU cache initialization—were addressed across SUSE Linux Enterprise and Micro kernel versions with numerous CVE fixes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting AMD processors, Linux kernel subsystems, and drivers—including a null pointer dereference in the SCSI lpfc driver and the VMSCAPE branch predictor isolation flaw—were addressed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various CPU architectures and Linux kernel subsystems, including MIPS stack handling, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were fixed to prevent crashes, privilege escalation, and data leaks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel, including a critical out-of-bounds access flaw in the jfs filesystem and a branch predictor isolation issue (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple updates to the Linux kernel and SUSE Linux Enterprise products addressed numerous critical security vulnerabilities affecting AMD processors, various kernel subsystems, drivers, and filesystems, including fixes for data leakage, memory corruption, and branch predictor isolation flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others addressed critical vulnerabilities including a double-free flaw in the scsi bfa driver, CPU cache initialization issues on AMD processors, the VMSCAPE vulnerability, race conditions, and use-after-free bugs across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities across various architectures, subsystems, and drivers, including fixes for AMD CPU cache issues, iSER setup panics, and VMSCAPE branch predictor flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities including a branch predictor isolation flaw (VMSCAPE), CPU cache initialization issues, AMD processor data leaks, and ext4 filesystem error handling improvements.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including fbdev, memory management, networking, schedulers, and hardware drivers, were addressed across SUSE Linux Enterprise and Micro kernel versions to prevent buffer overflows, data leakage, and privilege escalation.
CWE-787 - Out-of-bounds Write| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including null pointer dereference, CPU cache initialization flaws, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were discovered and fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update addressed multiple security vulnerabilities across various subsystems and architectures, including fixes for the NTFS3 file system, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update addressed multiple security vulnerabilities across various architectures and subsystems, including fixes for DRBD use-after-free, AMD CPU cache flaws, AppArmor LSM issues, and the VMSCAPE branch predictor isolation vulnerability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel affecting various architectures, drivers, and subsystems—including a deadlock in SMB server, AMD CPU issues, SEV-SNP memory integrity flaws, and the VMSCAPE branch predictor isolation vulnerability—were fixed to enhance system security.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including the VMSCAPE branch predictor isolation flaw, CPU cache initialization issues, and memory management bugs, were fixed across various Linux kernel versions and SUSE Enterprise products affecting numerous architectures and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including slab-out-of-bounds reads, use-after-free, race conditions, memory leaks, CPU cache initialization flaws, AMD processor data leakage, and the critical VMSCAPE branch predictor isolation flaw were fixed across various Linux kernel subsystems in SUSE Linux Enterprise and other distributions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including a slab-out-of-bounds issue in the Linux kernel's hfsplus_bnode_read() function and the VMSCAPE flaw affecting branch predictor isolation, were fixed across various SUSE Linux Enterprise and Linux kernel versions impacting numerous subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting AMD processors and various Linux kernel subsystems including HFS filesystem, coresight, sched, usb, scsi, KVM, netfilter, and others were fixed across SUSE Linux Enterprise and Micro kernels to prevent memory access violations, data leakage, and branch predictor isolation flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including a refcount leak in netfilter, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue were fixed across various Linux kernel versions and SUSE Enterprise products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in the Linux kernel's LoongArch BPF implementation caused incorrect jump offset calculations in tail calls, leading to soft lockups, which was fixed by correcting the JIT context initialization and offset calculation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including use-after-free, race conditions, CPU cache flaws, and branch predictor isolation issues, were addressed across SUSE Linux Enterprise and Micro kernels with extensive patches.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel versions, including SUSE Enterprise and Micro kernels, were addressed, covering issues in drivers, filesystems, CPU architectures (notably AMD), and virtualization subsystems such as the VMSCAPE flaw.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and bugs affecting Linux kernel components including netlink, schedulers, drivers, memory management, and GPU subsystems were fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including slab out-of-bounds in the smb3 subsystem, CPU cache initialization flaws, and AMD processor data leakage, were fixed across various SUSE Linux Enterprise versions and NetApp products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel and AMD processors across various architectures, drivers, and subsystems were addressed, including issues like race conditions, memory leaks, use-after-free bugs, CPU cache initialization flaws, and branch predictor isolation (VMSCAPE).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel versions and SUSE Linux Enterprise products, including issues like destination refcount leaks, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were addressed with extensive patches.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting SUSE Linux Enterprise kernels, including AMD processors, AppArmor LSM, and various kernel subsystems and drivers, were fixed to prevent kernel crashes, privilege escalation, data leaks, and integrity loss.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security fixes were applied across various SUSE Linux Enterprise and Micro kernel versions, addressing vulnerabilities such as race conditions, use-after-free bugs, memory leaks, null pointer dereferences, and a specific fix in the Linux kernel asix_devices USB network driver for PHY address masking.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and race conditions affecting various Linux kernel subsystems, including ppp, scsi, net, drm, ACPI, and critical AMD CPU and SEV-SNP memory integrity issues, were fixed across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel and AMD processors across numerous subsystems and architectures, including null pointer dereferences, CPU cache initialization flaws, data leakage, and branch predictor isolation issues, were identified and addressed in various SUSE Linux Enterprise and Micro kernel updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates, including SUSE Linux Enterprise and Micro versions, addressed numerous critical security vulnerabilities across various subsystems, drivers, and architectures, such as CPU cache initialization, AMD processor data leakage, and the VMSCAPE flaw involving branch predictor isolation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers—including CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor flaw—were fixed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple SUSE Linux Enterprise kernel updates address numerous security vulnerabilities including buffer overflows, use-after-free, race conditions, TLS zero-length record handling, malicious packet rejection, and constant-time MAC comparison across various subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others addressed numerous security vulnerabilities including KASAN slab-out-of-bounds, CPU cache initialization flaws, AMD processor data leakage, VMSCAPE branch predictor isolation, and local privilege escalation in AppArmor LSM across various kernel subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including AMD processors, SEV-SNP guest memory, and the VMSCAPE branch predictor flaw, were addressed across various SUSE Linux Enterprise and Micro kernel versions with extensive fixes in numerous subsystems and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including drivers, filesystems, networking, and virtualization components, were fixed across SUSE Linux Enterprise and Micro kernels, addressing issues like race conditions, use-after-free, memory leaks, and privilege escalation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting various Linux kernel versions and subsystems, including AMD processor flaws, race conditions, use-after-free bugs, and the VMSCAPE vulnerability, were fixed across SUSE Linux Enterprise and Linux Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel affecting various CPU architectures, drivers, and subsystems—including the iio light as73211 driver and the VMSCAPE branch predictor isolation flaw—were fixed to prevent data leakage and memory corruption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel affecting various CPU architectures, drivers, and subsystems—including ftrace use-after-free bugs, AMD processor data leakage, SEV-SNP memory integrity, and VMSCAPE branch predictor isolation—were fixed across SUSE Linux Enterprise and other distributions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including use-after-free bugs, branch predictor isolation flaws (VMSCAPE), and CPU cache initialization issues, were fixed across various Linux kernel subsystems and architectures, affecting SUSE Linux Enterprise and Micro products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel security updates addressed numerous vulnerabilities including improper CPU cache initialization affecting AMD processors and SEV-SNP guest memory, alongside fixes for local privilege escalation in AppArmor and kernel subsystem issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including drm/amd/display, AMD CPU cache, AppArmor LSM, and virtualization branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including s390/sclp, AMD CPU cache initialization, AppArmor, and others, were fixed across SUSE Linux Enterprise and Micro products, addressing issues such as improper memory access and data leakage.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including race conditions, use-after-free flaws, and branch predictor isolation issues, were identified and fixed across various Linux kernel subsystems and architectures, notably affecting SUSE Linux Enterprise and Micro distributions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel components, including ACPI's pfr_update driver, AMD processors, and SEV-SNP guest memory integrity, were discovered and addressed across SUSE Linux Enterprise and Micro kernel versions with extensive fixes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple severe security vulnerabilities affecting various Linux kernel subsystems, including ipv6: sr MAC timing attacks, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were fixed across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including HSR network protocol, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernels with extensive updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE address numerous security vulnerabilities affecting AMD processors, various kernel subsystems, drivers, and architectures, including fixes for KFD debugfs, AppArmor LSM, and SEV-SNP guest memory issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems and AMD processors, including critical CPU cache initialization flaws, data leakage, and the VMSCAPE branch predictor isolation issue, were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and stability issues affecting various Linux kernel subsystems, architectures, and AMD processors were addressed across SUSE Linux Enterprise and Micro kernels, including fixes for the media: venus driver and the VMSCAPE vulnerability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and bugs affecting various Linux kernel components, including AMD CPU data leakage, race conditions, and branch predictor isolation flaws, were fixed across SUSE Linux Enterprise and Linux kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, CPU architectures including AMD processors, and drivers were fixed across SUSE Linux Enterprise and Micro kernels, including a critical VMSCAPE flaw involving branch predictor isolation between guest VMs and hypervisors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel affecting various architectures and subsystems, including parisc, CPU cache initialization, AMD processor data leakage, and AppArmor, were addressed to prevent unauthorized access and privilege escalation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel affecting various architectures, including parisc and AMD processors, were fixed, addressing issues such as improper CPU cache initialization, data leakage, and privilege escalation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel, including vsock/virtio SKB overflow, CPU cache initialization flaws, and AMD processor data leakage, were addressed across various SUSE Linux Enterprise and Micro kernel versions with extensive security and stability updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including out-of-bounds array access in the bno055 IMU driver and improper CPU cache initialization, were addressed in updates to SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting Linux kernel subsystems, including AMD CPU data leakage, SEV-SNP guest memory integrity, and the VMSCAPE branch predictor flaw, were fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
The Linux kernel addressed multiple security vulnerabilities across various architectures and subsystems, including AMD CPU cache flaws, the VMSCAPE branch predictor isolation issue, and deadlock fixes related to kmemleak_lock and netpoll interactions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
This Linux kernel update addresses multiple security vulnerabilities across various architectures and subsystems, including AMD CPU data leakage, SEV-SNP memory integrity flaws, VMSCAPE branch predictor isolation issues, and a soft lockup fix in kmemleak cleanup.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including btrfs subvolume relocation, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE Linux Enterprise and others address a wide range of security vulnerabilities including divide-by-zero errors, race conditions, use-after-free, null pointer dereferences, information leaks, and CPU cache initialization flaws across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting Linux kernel subsystems, drivers, filesystems, and architectures—including the VMSCAPE flaw and CPU cache and AMD processor issues—were fixed across SUSE Linux Enterprise and Micro product lines.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers—including data races in RCU, branch predictor isolation (VMSCAPE), AMD processor data leakage, and AppArmor flaws—were addressed through extensive patches across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update addresses multiple security vulnerabilities including ARM rockchip SMP initialization hangs, CPU cache initialization flaws, AMD processor data leaks, AppArmor LSM privilege escalations, and the VMSCAPE branch predictor isolation issue across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE Linux Enterprise and related distributions address critical security vulnerabilities across file descriptor allocation, networking, device drivers, CPU cache initialization, AMD processor data leakage, and branch predictor isolation flaws affecting various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates, including SUSE Enterprise and Micro versions, addressed numerous security vulnerabilities such as memory leaks, race conditions, use-after-free bugs, AMD processor data leakage, and a VM branch predictor isolation flaw (VMSCAPE).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and race conditions in the Linux kernel, including btrfs qgroup use-after-free and AMD SEV-SNP guest memory issues, were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous subsystems and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel and AMD processors across various architectures, drivers, and subsystems, including USB, Bluetooth, and virtualization, were addressed in updates for SUSE Linux Enterprise and related distributions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, architectures, and drivers—including CPU cache initialization flaws, AMD data leakage, and the VMSCAPE branch predictor isolation issue—were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and bugs affecting various Linux kernel versions, including SUSE Linux Enterprise and Micro kernels, were addressed, covering issues in IPv6 TSO handling, CPU cache initialization, AMD processor data leakage, and numerous subsystems such as coresight, schedulers, USB, SCSI, networking, and filesystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting Linux kernel subsystems, AMD processors, and virtualization components were addressed across various SUSE Linux Enterprise and Micro kernel versions, including fixes for NULL pointer dereferences, race conditions, and branch predictor isolation flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including timer overflow, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were addressed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel vulnerabilities were fixed, including memory corruption in debug_vm_pgtable, CPU cache initialization flaws, AMD processor data leakage, AppArmor LSM issues, and the VMSCAPE branch predictor isolation flaw across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel components, including CPU architectures, drivers, filesystems, and subsystems such as jbd2_log_do_checkpoint and branch predictor isolation (VMSCAPE), were identified and addressed across SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel and AMD processors, including use-after-free bugs, CPU data leakage, SEV-SNP memory integrity issues, and the VMSCAPE flaw in branch predictor isolation, were fixed across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel architectures, drivers, and subsystems—including MDT loader buffer validation, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE)—were identified and addressed in SUSE Linux Enterprise and Micro kernel updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and bugs affecting various Linux kernel subsystems, including scsi: ufs: exynos driver, CPU cache initialization, AMD processor data leakage, and branch predictor isolation, were fixed across SUSE Linux Enterprise and other kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting Linux kernel subsystems, including the MHI host driver, CPU cache initialization, AMD processors, and branch predictor isolation (VMSCAPE), were identified and patched across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others fixed numerous security vulnerabilities including ARM Tegra I/O memcpy issues, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE vulnerability across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A comprehensive Linux kernel update addressed multiple critical security vulnerabilities, including CPU cache memory initialization flaws, AMD processor data leakage, the VMSCAPE vulnerability, and various issues across numerous subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE address numerous critical security vulnerabilities including memory leaks, race conditions, use-after-free bugs, CPU cache and AMD processor flaws, and the VMSCAPE vulnerability affecting virtualization isolation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including btrfs metadata corruption, AMD processor flaws, and various subsystems such as memory management, networking, and drivers, were fixed across SUSE Linux Enterprise and Micro products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including USB, networking, filesystems, and drivers, were identified and fixed across SUSE Linux Enterprise and Micro kernels, alongside a VMSCAPE flaw impacting branch predictor isolation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including HID multitouch, AppArmor, coresight, sched, USB, SCSI, KVM, and AMD processors, were identified and addressed across SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including a page fault in the hid-ntrig driver, flaws in AppArmor LSM, the VMSCAPE branch predictor isolation issue, and AMD Zen processor EntrySign flaw, were addressed across various SUSE Linux Enterprise and Micro kernel updates.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities across networking, filesystems, drivers, and subsystems including critical AppArmor LSM flaws and a branch predictor isolation issue (VMSCAPE).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE address numerous security vulnerabilities including race conditions in ftrace, flaws in AppArmor LSM, AMD CPU microcode verification issues, and the VMSCAPE branch predictor isolation vulnerability across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel and AppArmor LSM affecting various subsystems such as efivarfs, crypto, bpf, cifs, and architectures were fixed, including slab-out-of-bounds, use-after-free, race conditions, and CPU microcode verification flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple updates to SUSE Linux Enterprise kernels address numerous security vulnerabilities including inconsistent reference count handling in SMB filesystem, AppArmor LSM privilege escalations, and AMD Zen CPU microcode verification flaws.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates across SUSE Linux Enterprise and Micro versions addressed numerous security vulnerabilities including speculative execution side-channel mitigations, AppArmor LSM flaws, AMD CPU microcode issues, and branch predictor isolation (VMSCAPE), affecting various subsystems and drivers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including use-after-free in the ASUS HID driver, AppArmor LSM flaws, VMSCAPE branch predictor isolation, and CPU microcode signature issues in AMD Zen processors, affect various Linux kernel subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE address numerous security vulnerabilities including race conditions, use-after-free bugs, memory leaks, and critical flaws in the AppArmor LSM and AMD Zen CPU microcode verification across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including race conditions, use-after-free bugs, privilege escalations, denial of service, and information leaks were fixed across various Linux kernel subsystems and the AppArmor LSM in SUSE Linux Enterprise and Micro kernels.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates, including SUSE Enterprise and Micro versions, address numerous security vulnerabilities such as slab-use-after-free, privilege escalation, denial of service, and information leaks across various subsystems, drivers, and architectures, with notable fixes in AppArmor LSM and AMD Zen microcode verification.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities, including flaws in the Linux kernel's ATM TCP driver, AppArmor LSM, and a branch predictor isolation issue (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including XFS filesystem, AppArmor LSM, AMD processors, and branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernels to prevent system crashes, privilege escalation, and data exposure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including NULL pointer dereferences, memory leaks, race conditions, and privilege escalation flaws in the Linux kernel and AppArmor module were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels, as well as AMD processor microcode.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel versions and subsystems, including batman-adv, AppArmor, and AMD processors, were identified and fixed, addressing issues such as out-of-bounds reads/writes, race conditions, use-after-free, and information exposure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical security vulnerabilities affecting various Linux kernel subsystems, including SCSI drivers, AppArmor security module, memory management, and a branch predictor isolation flaw (VMSCAPE), were addressed in updates for SUSE Linux Enterprise and Linux kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including null pointer dereferences in ocfs2, AppArmor LSM privilege escalations, and AMD Zen microcode flaws were fixed across various SUSE Linux Enterprise and Micro kernel versions, addressing memory leaks, race conditions, and driver issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities in the Linux kernel and AppArmor LSM, including a deadlock in the SLUB allocator and AMD CPU microcode verification flaws, were fixed to prevent denial of service, privilege escalation, and information leaks across numerous architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting various Linux kernel subsystems, including AppArmor, memory management, drivers, and AMD processors, were discovered and addressed across SUSE Linux Enterprise and Micro kernels, involving privilege escalation, denial of service, and information exposure risks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and bugs affecting Linux kernel subsystems, including AppArmor LSM, x86/mm/64 paging, and AMD processors, were addressed in various SUSE Linux Enterprise and Micro kernel updates to fix privilege escalation, memory leaks, race conditions, and system crashes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including NULL pointer dereferences, race conditions, use-after-free, memory leaks, and privilege escalation flaws were addressed across various Linux kernel subsystems and architectures, affecting SUSE Linux Enterprise and other distributions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including memory leaks, privilege escalation, denial of service, and information leaks, were identified and fixed across various Linux kernel subsystems, drivers, and architectures, notably affecting SUSE Linux Enterprise and AppArmor modules.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities and regressions affecting the Linux kernel, including the AppArmor security module, AMD CPU microcode verification, and subsystems like coresight, sched, usb, scsi, and netfilter, were fixed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including a critical SSID length bounds check fix in cfg80211, numerous AppArmor LSM flaws, and a critical AMD Zen CPU microcode signature verification issue, were addressed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting the Linux kernel, including the i40e driver, AppArmor LSM, and AMD CPU microcode, were fixed across various SUSE Linux Enterprise and Micro kernel versions to address privilege escalation, denial of service, and information leaks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including NULL pointer dereferences, race conditions, memory leaks, use-after-free bugs, and flaws in the AppArmor Linux kernel Security Module and AMD Zen microcode verification were addressed across various SUSE Linux Enterprise and Micro kernel versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities including use-after-free in Bluetooth, flaws in AppArmor LSM, branch predictor isolation (VMSCAPE), and AMD Zen CPU microcode loading were fixed across various Linux kernel versions and SUSE Enterprise products to address privilege escalation, denial of service, and information leaks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities, including use-after-free bugs, branch predictor isolation flaws (VMSCAPE), and issues in AppArmor LSM and AMD CPU microcode verification, were identified and fixed across various Linux kernel subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE and others address critical security vulnerabilities including NULL pointer dereferences, memory leaks, race conditions, branch predictor isolation flaws (VMSCAPE), and AMD CPU microcode signature verification issues across various subsystems and architectures.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates from SUSE address critical security vulnerabilities including use-after-free, race conditions, privilege escalation, denial of service, information leaks, and the VMSCAPE branch predictor isolation flaw across various architectures and subsystems.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Linux kernel updates address the VMSCAPE vulnerability and numerous other security issues including memory leaks, use-after-free, race conditions, and hardware-specific bugs across various subsystems and SUSE Linux Enterprise product lines.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Certain devices exhibit a null pointer dereference vulnerability in processing specific IPv4 requests, which can lead to a denial of service condition requiring manual system restart.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in multiple BluePlanet device models allows attackers to derive Technical Service credentials from device serial numbers using a CRC16-based algorithm, enabling unauthorized access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in multiple RUGGEDCOM ROX device models below version V2.17.1 allows authenticated remote attackers to execute arbitrary commands with root privileges due to improper sanitization of user input during feature key installation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in RUGGEDCOM ROX devices below version 2.17.1 allows authenticated remote attackers to read arbitrary files with root privileges via improper input validation in the web server's JSON-RPC interface.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A command injection vulnerability in RUGGEDCOM ROX devices below version 2.17.1 allows authenticated remote attackers to execute arbitrary commands with root privileges via the Scheduler functionality in the Web UI.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple use-after-free vulnerabilities and memory management issues in WebKitGTK, Safari, iOS, iPadOS, macOS, and Oracle Java SE 8u471-b50 were fixed to prevent crashes, memory corruption, and potential system compromise from malicious web content.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Net-tools versions up to 2.10 contain multiple stack-based buffer overflow vulnerabilities, including CVE-2025-46836, due to missing bounds checks in interface label handling and unsafe memory operations, potentially allowing arbitrary code execution or crashes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affect GStreamer plugins, Oracle Java SE 8u471-b50's JavaFX gstreamer component, and Oracle Database Server's GraalVM engine, including heap buffer over-reads and unauthorized data access risks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Apache Tomcat versions 9.0.0.M1 to 11.0.9 are vulnerable to the MadeYouReset denial of service attack exploiting improper HTTP/2 stream resets, with multiple updates released to address this and other related security and stability issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in libxml2, including heap use after free, type confusion, stack buffer overflow, and integer overflow, can lead to denial of service, crashes, or data manipulation in affected Oracle products and other environments.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in libxml2, including heap use-after-free, type confusion, stack buffer overflow, integer overflow, and null pointer dereference, can lead to denial of service, crashes, or unauthorized data modification.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities including CVE-2025-53057, CVE-2025-53066, and CVE-2025-61748 affect Oracle Java SE and OpenJDK versions 8u461 through 25, allowing unauthenticated network attackers to access and modify critical data via APIs with a CVSS score of 5.9.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical vulnerabilities (CVE-2025-53057, CVE-2025-53066, CVE-2025-61748) in Oracle Java SE and GraalVM across versions 8u461, 11.0.28, 17.0.16, 21.0.8, and 25 allow unauthenticated attackers to gain unauthorized access and modify sensitive data via APIs and XML External Entity attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Apache Tomcat versions up to 11.0.13 suffer from directory traversal and URL normalization vulnerabilities that allow bypassing security constraints and potential remote code execution via PUT requests, alongside other issues like denial of service and improper input handling.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in Apache Tomcat versions up to 11.0.10, 10.1.44, and 9.0.108 include improper neutralization of ANSI escape sequences in log messages, directory traversal with possible remote code execution, denial of service, and other security issues, with fixes in later versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple security vulnerabilities affecting Oracle Java SE, Oracle GraalVM, NetApp products, IBM Java, and OpenJDK versions 21 and 25 involve unauthorized data modification, encoded string handling, XML External Entity attacks, and certificate handling with CVSS scores up to 3.7.
CWE-581 - Object Model Violation: Just One of Equals and Hashcode Defined| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple Apache Tomcat versions up to 11.0.13, 10.1.48, and 9.0.115 contain vulnerabilities including denial of service from delayed cleanup of multipart upload files, directory traversal with possible remote code execution, and improper input neutralization.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
OpenSSL versions 3.5.x and 3.6.x contain a TLS 1.3 key exchange group selection flaw involving the 'DEFAULT' keyword that affects post-quantum group negotiation, alongside multiple other security vulnerabilities including memory handling and RSA KEM issues.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in Oracle Java SE and GraalVM RMI components across various versions allow unauthenticated network attackers to gain unauthorized access, with updates addressing security flaws in RMI, AWT/JavaFX, Networking, and Security components.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in Oracle Java SE and GraalVM components including RMI, AWT, JavaFX, Networking, and Security allow unauthenticated remote attackers to compromise data integrity and execute attacks across various supported Java versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple vulnerabilities in Oracle Java SE and GraalVM components across various versions allow unauthenticated remote attackers to access, modify data, execute code, or redirect users, with updates addressing issues in RMI, AWT/JavaFX, Networking, and Security components.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple critical vulnerabilities in Oracle Java SE and GraalVM affect components such as RMI, AWT/JavaFX, Networking, and Security, allowing unauthenticated remote attackers to cause denial of service, execute code, steal information, or modify files across various Java versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Oracle Java SE JavaFX 8u471-b50 contains a difficult-to-exploit vulnerability allowing unauthenticated network attackers with user interaction to modify data in sandboxed applications, while GraalVM Multilingual Engine has a non-exploitable security-in-depth issue in Oracle Database Server.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in SIMATIC CN 4100 versions below V5.0 allows unauthenticated connections and resource exhaustion, potentially disrupting operations and compromising system availability and integrity.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in SIMATIC CN 4100 versions below V5.0 allows denial-of-service by exhausting system resources through a high volume of TCP SYN packets.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Certain devices fail to properly validate and sanitize PLC/station names on the web interface's communication parameters page, enabling authenticated users with project download rights to inject malicious scripts executed upon page access by legitimate users.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in the 'Motion Control Diagnostics' web page allows authenticated users with project download rights to inject malicious scripts via improper validation of Technology Object names, enabling script execution in other users' sessions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Certain devices fail to properly validate filenames on their Firmware Update page, allowing remote attackers to execute malicious JavaScript through social engineering, potentially leading to session hijacking or credential theft.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A missing authentication vulnerability in Apache Artemis and ActiveMQ Artemis Core protocol allows unauthenticated remote attackers to inject or exfiltrate messages by forcing brokers to connect to rogue brokers in affected versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Affected devices inadequately restrict web browser access via the Control Panel, enabling unauthenticated attackers to gain unauthorized access and potentially exploit system vulnerabilities.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple OpenSSL versions contain critical vulnerabilities including use-after-free in DANE client code, NULL pointer dereferences, heap buffer overflows, and RSA KEM failure handling issues, affecting TLS and cryptographic operations.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A NULL pointer dereference vulnerability in OpenSSL's delta CRL processing can cause application crashes and Denial of Service, with exploitation requiring specific conditions and assessed as low severity.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple OpenSSL vulnerabilities including NULL pointer dereferences in CMS KeyAgreeRecipientInfo processing, use-after-free, heap buffer overflow, and TLS 1.3 key agreement issues can cause application crashes and Denial of Service, affecting various OpenSSL versions and some NetApp products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A NULL pointer dereference vulnerability (CVE-2026-28390) in OpenSSL occurs during processing of crafted CMS EnvelopedData messages with KeyTransportRecipientInfo using RSA-OAEP, potentially causing application crashes and Denial of Service.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple OpenSSL vulnerabilities including a heap buffer overflow in hexadecimal conversion on 32-bit platforms, use-after-free, NULL pointer dereferences, TLS 1.3 key agreement issues, and RSA KEM failure handling have been identified, affecting various versions and products.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
OpenSSL's RSASVE key encapsulation vulnerability (CVE-2026-31790) allows sensitive data leakage from uninitialized memory due to improper handling of RSA_public_encrypt() failures and invalid RSA public key validation, affecting multiple products including Oracle Database Server and NetApp devices.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple versions of Teamcenter contain a vulnerability where improper encoding or filtering of user-supplied data allows attackers to inject malicious code that executes when other users access the affected content.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Multiple versions of Teamcenter contain hardcoded obfuscation keys embedded in the application, which attackers can extract to gain unauthorized access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
Axios versions prior to 1.15.0 and 0.3.1 contain a prototype pollution vulnerability exploitable via a header injection gadget chain, enabling escalation to remote code execution or full cloud compromise including AWS IMDSv2 bypass.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
An SQL injection vulnerability in the KACO Meteor server of blueplanet devices allows an authorized local network attacker to escalate privileges.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A path traversal vulnerability in ROS# versions prior to V2.2.2 allows remote attackers to access arbitrary files due to improper sanitization of user input.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A vulnerability in Solid Edge SE2026 versions before V226.0 Update 5 allows remote code execution via uninitialized pointer access during parsing of specially crafted PAR files.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
A stack-based buffer overflow vulnerability in Solid Edge SE2026 (all versions before V226.0 Update 5) when parsing specially crafted PAR files could enable code execution within the current process context.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Siemens / IE/PB-Link Firmware (OS)
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / IE/PB-link Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Opcenter RDnL
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / RUGGEDCOM ROX II family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE M-800 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE SC-600 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE W-700 IEEE 802.11n family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-200 series firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE X-300 Series Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XM-400 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SCALANCE XR-500 family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU DIQ
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC CFU PA
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC ET 200 SP Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC HMI Unified Comfort Panels family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-1500
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMATIC S7-410
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIMIT
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G115D
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS G130
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S110
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SINAMICS S150
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / SIPROTEC 5
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance W-700 Ieee 80211N Family
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-200 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Scalance X-300
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sentron PAC
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simatic S7-400 Firmware
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Simcenter Femap
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics G120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Sinamics S120
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Solid Edge SE2026
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens / Teamcenter
|
vers:unknown/* | ||
|
vers:unknown/*
Siemens AG / SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8
|
vers:unknown/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Siemens heeft kwetsbaarheden verholpen in verschillende (OT-)producten. Het gaat onder andere om producten in de Siemens RUGGEDCOM-, SCALANCE-, SIMATIC-, SIMIT-, SINAMICS-, SIPROTEC-, SENTRON- en Solid Edge-productreeksen.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen een kwaadwillende mogelijk in staat aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- (Remote) code execution\n- Toegang tot gevoelige gegevens\n- Verhogen van rechten\n\nVoor succesvol misbruik van de genoemde kwetsbaarheden moet de kwaadwillende (netwerk)toegang hebben tot het kwetsbare product. Het is goed gebruik een dergelijke producten niet publiek toegankelijk te hebben.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Siemens heeft beveiligingsupdates uitgebracht om de kwetsbaarheden te verhelpen. Voor de kwetsbaarheden waar nog geen updates voor zijn, heeft Siemens mitigerende maatregelen gepubliceerd om de risico\u0027s zoveel als mogelijk te beperken. Zie de bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"title": "CWE-93"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "general",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
},
{
"category": "general",
"text": "Insecure Inherited Permissions",
"title": "CWE-277"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-032379.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-078743.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-081142.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-085541.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-357982.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-387223.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-392349.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-545643.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-577017.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-688146.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-783943.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-786884.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-827383.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-870926.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-876049.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-921111.html"
},
{
"category": "external",
"summary": "Reference",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-973901.html"
}
],
"title": "Kwetsbaarheden verholpen in Siemens-producten",
"tracking": {
"current_release_date": "2026-05-13T06:33:28.624303Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0147",
"initial_release_date": "2026-05-13T06:33:28.624303Z",
"revision_history": [
{
"date": "2026-05-13T06:33:28.624303Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "IE/PB-Link Firmware (OS)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "IE/PB-link Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Opcenter RDnL"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX II"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX II Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROX II family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "SCALANCE M-800"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "SCALANCE M-800 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "SCALANCE SC-600"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "SCALANCE SC-600 Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "SCALANCE SC-600 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "SCALANCE W-700 IEEE 802.11n family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "SCALANCE X-200 series firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "SCALANCE X-300 Series Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "SCALANCE XM-400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "SCALANCE XM-400 Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "SCALANCE XM-400 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-18"
}
}
],
"category": "product_name",
"name": "SCALANCE XR-500 Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-19"
}
}
],
"category": "product_name",
"name": "SCALANCE XR-500 family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-20"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU DIQ"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-21"
}
}
],
"category": "product_name",
"name": "SIMATIC CFU PA"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-22"
}
}
],
"category": "product_name",
"name": "SIMATIC ET 200 SP Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-23"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI Unified Comfort Panels"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-24"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI Unified Comfort Panels Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-25"
}
}
],
"category": "product_name",
"name": "SIMATIC HMI Unified Comfort Panels family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-26"
}
}
],
"category": "product_name",
"name": "SIMATIC S7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-27"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-28"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-300"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-29"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-410"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-30"
}
}
],
"category": "product_name",
"name": "SIMIT"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-31"
}
}
],
"category": "product_name",
"name": "SINAMICS G115D"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-32"
}
}
],
"category": "product_name",
"name": "SINAMICS G130"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-33"
}
}
],
"category": "product_name",
"name": "SINAMICS S110"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-34"
}
}
],
"category": "product_name",
"name": "SINAMICS S150"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-35"
}
}
],
"category": "product_name",
"name": "SIPROTEC 5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-36"
}
}
],
"category": "product_name",
"name": "Scalance W-700 Ieee 80211N Family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-37"
}
}
],
"category": "product_name",
"name": "Scalance X-200 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-38"
}
}
],
"category": "product_name",
"name": "Scalance X-300"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-39"
}
}
],
"category": "product_name",
"name": "Sentron PAC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-40"
}
}
],
"category": "product_name",
"name": "Simatic S7-400 Firmware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-41"
}
}
],
"category": "product_name",
"name": "Simcenter Femap"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-42"
}
}
],
"category": "product_name",
"name": "Sinamics G120"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-43"
}
}
],
"category": "product_name",
"name": "Sinamics S120"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-44"
}
}
],
"category": "product_name",
"name": "Solid Edge SE2026"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-45"
}
}
],
"category": "product_name",
"name": "Teamcenter"
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-46"
}
}
],
"category": "product_name",
"name": "SINUMERIK 808D V4.7, SINUMERIK 808D V4.8, SINUMERIK 828D V4.7, SINUMERIK 840D sl V4.7, SINUMERIK 840D sl V4.8"
}
],
"category": "vendor",
"name": "Siemens AG"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-13103",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple U-Boot versions, including DENX and Das U-Boot through 2019.07-rc4, contain vulnerabilities such as infinite recursion from crafted DOS partition tables causing crashes, alongside numerous CVEs from 2019-2020 affecting bootloader functionality and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-13103 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-13103.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-13103"
},
{
"cve": "CVE-2019-13104",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "U-Boot versions 2016.11-rc1 through 2019.07-rc4 contain multiple security vulnerabilities, including a memcpy() underflow and stack buffer overflow triggered by crafted ext4 filesystems, addressed by CVE-2019-13106 and CVE-2019-13104.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-13104 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-13104.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-13104"
},
{
"cve": "CVE-2019-13106",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple U-Boot versions from 2016.09 to 2019.07-rc4 contain critical security vulnerabilities including stack buffer overflow and memcpy() underflow related to crafted ext4 filesystems, enabling potential code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-13106 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-13106.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-13106"
},
{
"cve": "CVE-2019-14192",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including an integer underflow causing unbounded memcpy in net_process_received_packet during UDP parsing, were addressed in Das U-Boot through version 2019.07, alongside fixes for network boot, USB keyboard, and hardware compatibility issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14192 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14192.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14192"
},
{
"cve": "CVE-2019-14193",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including an unbounded memcpy in Das U-Boot\u0027s nfs_readlink_reply function before version 2019.07, were addressed across various updates fixing numerous CVEs and improving hardware compatibility and functionality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14193 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14193.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14193"
},
{
"cve": "CVE-2019-14194",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including an unbounded memcpy in the NFSv2 nfs_read_reply function, were addressed in Das U-Boot through updates fixing numerous CVEs and improving hardware support and network boot functionality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14194 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14194.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14194"
},
{
"cve": "CVE-2019-14195",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including an unbounded memcpy in Das U-Boot\u0027s nfs_readlink_reply function prior to version 2019.07, along with various CVEs affecting network boot, USB, EFI, and descriptor handling, were addressed in recent U-Boot updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14195 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14195"
},
{
"cve": "CVE-2019-14196",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including unbounded memcpy in Das U-Boot up to version 2019.07 and various CVEs such as CVE-2019-13106, CVE-2019-11059, and CVE-2020-10648 were addressed in updates improving network boot, USB, and EFI support.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14196 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14196.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14196"
},
{
"cve": "CVE-2019-14197",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including out-of-bounds read issues in the nfs_read_reply function, were addressed in Das U-Boot up to version 2019.07 through updates fixing numerous CVEs and improving hardware compatibility and functionality.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14197 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14197.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14197"
},
{
"cve": "CVE-2019-14198",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including an unbounded memcpy in Das U-Boot\u0027s nfs_read_reply function and various CVEs affecting network boot, USB, and EFI support on ARM platforms have been addressed in recent U-Boot updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14198 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14198.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14198"
},
{
"cve": "CVE-2019-14199",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "other",
"text": "Integer Underflow (Wrap or Wraparound)",
"title": "CWE-191"
},
{
"category": "description",
"text": "Das U-Boot through version 2019.07 contains multiple security vulnerabilities including an integer underflow causing unbounded memcpy in UDP packet handling, with fixes addressing numerous CVEs from 2019 and 2020 alongside various functional improvements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14199 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14199.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14199"
},
{
"cve": "CVE-2019-14200",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Das U-Boot through version 2019.07 contains multiple security vulnerabilities including a stack-based buffer overflow in the nfs_handler reply helper function rpc_lookup_reply, with updates addressing numerous CVEs and various hardware and network boot issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14200 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14200"
},
{
"cve": "CVE-2019-14201",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including stack-based buffer overflows in the nfs_lookup_reply function, were addressed in Das U-Boot through version 2019.07, alongside fixes for network boot, USB keyboard, and other hardware-related issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14201 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14201"
},
{
"cve": "CVE-2019-14202",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including stack-based buffer overflows in the nfs_readlink_reply function and various CVEs affecting Das U-Boot through version 2019.07 have been addressed in recent U-Boot updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14202 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14202.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14202"
},
{
"cve": "CVE-2019-14203",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including stack-based buffer overflows and various CVEs affecting Das U-Boot through version 2019.07 have been addressed, alongside fixes for network boot, USB keyboard, and hardware compatibility issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14203 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14203.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14203"
},
{
"cve": "CVE-2019-14204",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including stack-based buffer overflows and various CVEs affecting Das U-Boot through version 2019.07, have been addressed in updates that also fix network boot, USB keyboard, and hardware compatibility issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-14204 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2019/cve-2019-14204.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2019-14204"
},
{
"cve": "CVE-2020-10648",
"notes": [
{
"category": "description",
"text": "Multiple U-Boot updates through 2020 address numerous security vulnerabilities including verified boot bypass, arbitrary code execution, and signature verification flaws, alongside fixes for hardware compatibility and network boot issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-10648 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2020/cve-2020-10648.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2020-10648"
},
{
"cve": "CVE-2022-2347",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "The U-Boot DFU implementation contains a vulnerability where an unchecked USB DFU download length field allows a physical attacker to write beyond a heap buffer by specifying a wLength greater than 4096 bytes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-2347 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-2347.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2022-2347"
},
{
"cve": "CVE-2022-30552",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "description",
"text": "Multiple vulnerabilities in U-Boot, including buffer overflows and arbitrary out-of-bounds writes during IP packet defragmentation and i2c md command processing, can cause denial of service and memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-30552 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-30552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2022-30552"
},
{
"cve": "CVE-2022-30790",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple vulnerabilities in U-Boot, including buffer overflows and out-of-bounds writes (CVE-2022-30552, CVE-2022-30790, CVE-2022-30767, CVE-2022-34835), affect components like IP defragmentation and i2c md command, impacting EcoStruxure\u2122 Panel Server Box and other systems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-30790 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-30790.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2022-30790"
},
{
"cve": "CVE-2022-34835",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple vulnerabilities in U-Boot through 2022.07-rc5 include a stack-based buffer overflow in the \u0027i2c md\u0027 command due to an integer signedness error, heap overflow in squashfs, and out-of-bounds writes in IP defragmentation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-34835 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2022/cve-2022-34835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2022-34835"
},
{
"cve": "CVE-2023-3019",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in QEMU, including heap buffer overflow, use-after-free, NULL pointer dereference, DMA reentrancy, and integer overflow, affect various components such as e1000e NIC emulation and Virtio, leading to denial of service, data disclosure, and potential code execution.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-3019 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-3019.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2023-3019"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "description",
"text": "Multiple Python updates address critical vulnerabilities including incorrect parsing of email addresses with special characters (CVE-2023-27043), timing side channels in HMAC comparison, and other security flaws affecting versions up to 3.11.12 with extensive fixes and improvements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-27043 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-27043.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2023-27043"
},
{
"cve": "CVE-2024-3447",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "description",
"text": "This QEMU update addresses multiple critical security vulnerabilities including heap buffer overflows, use-after-free, NULL pointer dereferences, DMA reentrancy double free, and information leaks affecting various versions and NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3447 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-3447.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-3447"
},
{
"cve": "CVE-2024-4367",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "description",
"text": "A missing type check in PDF.js font handling in Mozilla Firefox, Firefox ESR, and Thunderbird allows arbitrary JavaScript execution, affecting versions prior to Firefox 126, ESR 115.11, and Thunderbird 115.11.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4367 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-4367.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-4367"
},
{
"cve": "CVE-2024-22365",
"cwe": {
"id": "CWE-277",
"name": "Insecure Inherited Permissions"
},
"notes": [
{
"category": "other",
"text": "Insecure Inherited Permissions",
"title": "CWE-277"
},
{
"category": "description",
"text": "Linux PAM versions prior to 1.6.0, including the pam_namespace module, contain local denial of service vulnerabilities due to improper handling of mkfifo and missing O_DIRECTORY flag in openat calls, with additional security flaws found in Red Hat OpenShift and IBM QRadar SIEM components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22365 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-22365.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-22365"
},
{
"cve": "CVE-2024-47704",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "SUSE Linux Enterprise 15 SP5 and SP6 kernels, including Confidential Computing, Azure, RT, and Micro variants, received extensive security and non-security updates addressing vulnerabilities across networking, memory, filesystems, device drivers, graphics, and multiple architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47704 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47704.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-47704"
},
{
"cve": "CVE-2024-54017",
"cwe": {
"id": "CWE-334",
"name": "Small Space of Random Values"
},
"notes": [
{
"category": "other",
"text": "Small Space of Random Values",
"title": "CWE-334"
},
{
"category": "description",
"text": "Multiple versions of SIPROTEC 5 devices are vulnerable to brute force attacks on insufficiently random session identifiers, allowing unauthenticated remote attackers to gain unauthorized read access to limited web server information.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54017 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-54017.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-54017"
},
{
"cve": "CVE-2024-57256",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Multiple integer overflow vulnerabilities in Das U-Boot before 2025.01-rc1 affect ext4 symlink resolution, inode size handling, DHCP response processing, and memory allocation, potentially leading to memory corruption and arbitrary code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57256 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57256.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-57256"
},
{
"cve": "CVE-2024-57258",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Das U-Boot before version 2025.01-rc1 contains multiple integer overflow vulnerabilities in memory allocation, ext4 symlink resolution, and squashfs filesystem handling, potentially leading to crashes or arbitrary code execution.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57258 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57258.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-57258"
},
{
"cve": "CVE-2024-57924",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "description",
"text": "Multiple security and non-security fixes were applied across various SUSE Linux Enterprise kernels, addressing numerous vulnerabilities in networking, filesystems, Bluetooth, and other kernel subsystems and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-57924"
},
{
"cve": "CVE-2024-58240",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple SUSE Linux Enterprise kernels, including versions 12, 15 (SP3 to SP7), Micro 6.x, and Azure variants, received extensive security updates addressing vulnerabilities in Bluetooth, networking, filesystems, USB, SCSI, memory management, and hardware drivers, alongside a Linux kernel TLS decryption refactor to improve processing correctness.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-58240 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-58240.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2024-58240"
},
{
"cve": "CVE-2025-0395",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"notes": [
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "description",
"text": "Multiple vulnerabilities including a buffer overflow in glibc\u0027s assert() function (CVE-2025-0395) affect GNU C Library versions 2.13 to 2.40 and various products like NetApp, Oracle Communications, and HPE Brocade, leading to potential DoS, data modification, and unauthorized access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-0395 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-0395.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-0395"
},
{
"cve": "CVE-2025-3576",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "description",
"text": "A vulnerability in MIT Kerberos 5 (CVE-2025-3576) allows spoofing of GSSAPI-protected messages via weaknesses in the RC4-HMAC-MD5 checksum, leading to disabling of weak ciphers like des3-cbc-sha1 and arcfour-hmac-md5 by default.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3576 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3576.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-3576"
},
{
"cve": "CVE-2025-6020",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "A set of vulnerabilities in linux-pam\u0027s pam_namespace module, including symlink and race condition flaws, allow local users to escalate privileges to root and cause information disclosure or denial of service, addressed by updates changing path handling and disabling user .pam_environment file reading.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6020 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6020.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-6020"
},
{
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple vulnerabilities in libxml2, including integer overflows, stack buffer overflows, heap use-after-free, type confusion, and null pointer dereferences, can lead to denial of service or crashes, affecting versions up to 2.14.3 and related Oracle products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6021 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6021.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-6021"
},
{
"cve": "CVE-2025-6052",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Multiple vulnerabilities in GLib\u0027s GString, including integer overflow and buffer underflow (CVE-2025-6052, CVE-2025-4373), and a difficult-to-exploit Java SE 8u471-b50 JavaFX flaw can cause crashes, memory corruption, or partial denial of service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6052 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6052.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-6052"
},
{
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "A heap use-after-free vulnerability in libxslt caused by attribute type flag corruption leads to memory corruption, crashes, and potential code execution, affecting libxml2, Oracle Java SE 8u471-b50, and Oracle Communications Cloud Native Core Certificate Management with CVSS scores up to 7.8.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7425 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-7425"
},
{
"cve": "CVE-2025-8916",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities including excessive resource allocation, denial of service, injection flaws, and information disclosure affect Bouncy Castle Java libraries, Oracle Communications, Oracle Siebel CRM, Oracle Fusion Middleware, HPE Telco Service Activator, and various Ubuntu LTS versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/S:P/R:U/RE:M/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8916 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8916.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-8916"
},
{
"cve": "CVE-2025-9230",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple OpenSSL vulnerabilities including CVE-2025-9230 cause out-of-bounds read/write in RFC 3211 KEK unwrap during CMS password-based decryption, potentially leading to crashes or code execution, with moderate severity and low exploit likelihood due to rare usage.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9230 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9230.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-9230"
},
{
"cve": "CVE-2025-9231",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "description",
"text": "Multiple vulnerabilities including a timing side-channel in the SM2 algorithm on 64-bit ARM platforms, memory handling flaws, and denial of service issues affect OpenSSL, Oracle PeopleSoft, Oracle JD Edwards, and NetApp products, with moderate severity in some cases.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9231 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9231.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-9231"
},
{
"cve": "CVE-2025-9232",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple OpenSSL vulnerabilities, including an out-of-bounds read in the HTTP client \u0027no_proxy\u0027 handling causing denial of service, affect various products such as Oracle Essbase, PeopleSoft, JD Edwards, SAP NetWeaver, and NetApp, with severity ranging from low to moderate.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9232 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-9232"
},
{
"cve": "CVE-2025-9714",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Libxml2 versions up to 2.9.14 contain infinite recursion vulnerabilities in exsltDynMapFunction and catalog parsing functions, causing stack exhaustion and local denial of service without arbitrary memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9714 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9714.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-9714"
},
{
"cve": "CVE-2025-9820",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "GnuTLS versions prior to 3.8.11 contain buffer overflow vulnerabilities in gnutls_pkcs11_token_init and issues with malicious certificates and PKCS11 token labels, leading to denial of service and potential arbitrary code execution (CVE-2025-9820, CVE-2025-14831).",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9820 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-9820"
},
{
"cve": "CVE-2025-12659",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "description",
"text": "A memory corruption vulnerability in applications parsing specially crafted IPT files may enable attackers to execute arbitrary code within the affected process.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-12659 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-12659.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-12659"
},
{
"cve": "CVE-2025-14831",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "description",
"text": "GnuTLS versions prior to 3.8.12 contain vulnerabilities including CVE-2025-14831, causing denial of service via excessive CPU and memory use from malicious certificates with many name constraints and SANs, and CVE-2025-9820, related to crashes or potential code execution from PKCS11 token label mishandling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14831 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-14831.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-14831"
},
{
"cve": "CVE-2025-22871",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "description",
"text": "A vulnerability in Go\u0027s net/http package allows acceptance of chunked data with bare LF line terminators, enabling HTTP request smuggling when combined with other misinterpreting servers, affecting multiple Go versions prior to 1.23.8 and 1.24.2.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22871 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-22871.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-22871"
},
{
"cve": "CVE-2025-23143",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel and AppArmor LSM affecting various architectures and subsystems were fixed, including null pointer dereferences and privilege escalation risks, to enhance system security and prevent local attacks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23143 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-23143.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-23143"
},
{
"cve": "CVE-2025-23160",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "Multiple SUSE Linux Enterprise kernels, including 15 SP6, 15 SP7, and Micro 6.x versions, received extensive security and non-security updates addressing vulnerabilities in networking, filesystems, drivers, CPU cache initialization, AMD processors, and various kernel subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-23160 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-23160.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-23160"
},
{
"cve": "CVE-2025-31257",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including use-after-free flaws and memory corruption in WebKitGTK, Safari 18.5, and Oracle Java SE JavaFX were fixed through improved memory handling and updates addressing crashes, data exfiltration, and remote code execution risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31257 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31257.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-31257"
},
{
"cve": "CVE-2025-37931",
"notes": [
{
"category": "description",
"text": "Multiple SUSE Linux Enterprise and Micro kernel versions received extensive security updates addressing numerous vulnerabilities across CPU cache initialization, AMD processors, filesystems including btrfs, drivers, and various kernel subsystems, alongside many non-security bug fixes and improvements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-37931 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-37931.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-37931"
},
{
"cve": "CVE-2025-37968",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple updates to SUSE Linux Enterprise kernels, including 15 SP6, SP7, Micro, Azure, Confidential Computing, and RT variants, addressed numerous security vulnerabilities and bugs across diverse subsystems such as media, networking, tracing, filesystems, drivers, and CPU architectures including AMD processors and the VMSCAPE flaw.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-37968 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-37968.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-37968"
},
{
"cve": "CVE-2025-38322",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities and non-security bugs affecting various Linux kernel subsystems, including CPU cache initialization flaws, AMD processor data leakage, and a Linux kernel crash on RaptorLake CPUs, were fixed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38322 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38322.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38322"
},
{
"cve": "CVE-2025-38347",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel, including a f2fs filesystem inode sanity check fix, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue, were addressed across various subsystems and architectures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38347 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38347.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38347"
},
{
"cve": "CVE-2025-38491",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel, including atomicity issues in the mptcp subsystem, CPU cache initialization flaws, and AMD processor data leaks, were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous subsystems and architectures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38491 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38491"
},
{
"cve": "CVE-2025-38502",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "A comprehensive Linux kernel update fixed multiple critical vulnerabilities including out-of-bounds access in cgroup local storage via BPF, AppArmor LSM flaws, AMD CPU microcode loading issues, and the VMSCAPE branch predictor isolation vulnerability across various architectures and subsystems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38502 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38502.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38502"
},
{
"cve": "CVE-2025-38552",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel, including race conditions in the mptcp subsystem, CPU cache initialization flaws, and AMD processor data leaks, were fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38552 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38552"
},
{
"cve": "CVE-2025-38614",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including the VMSCAPE branch predictor isolation flaw and CPU cache initialization issues, were addressed in various Linux kernel versions across SUSE Linux Enterprise and Linux Micro products, with fixes spanning numerous architectures, subsystems, and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38614 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38614.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38614"
},
{
"cve": "CVE-2025-38670",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers\u2014including arm64 stack switching, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor flaw\u2014were fixed across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38670 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38670.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38670"
},
{
"cve": "CVE-2025-38676",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"notes": [
{
"category": "other",
"text": "Buffer Access with Incorrect Length Value",
"title": "CWE-805"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including stack buffer overflows, CPU cache initialization flaws, and the VMSCAPE branch predictor isolation issue, were fixed across various Linux kernel components and SUSE Linux Enterprise products to enhance system security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38676 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38676.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38676"
},
{
"cve": "CVE-2025-38677",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "A comprehensive Linux kernel update fixed multiple security vulnerabilities including out-of-boundary access in the f2fs filesystem, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue across various architectures and subsystems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38677 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38677"
},
{
"cve": "CVE-2025-38679",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including the media: venus driver, CPU cache initialization, AMD processors, and numerous drivers, were addressed through extensive patches in SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38679 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38679.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38679"
},
{
"cve": "CVE-2025-38680",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including AMD processors, uvcvideo driver, AppArmor module, and branch predictor isolation (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions to address out-of-bounds reads, privilege escalation, data leakage, and system integrity issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38680 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38680.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38680"
},
{
"cve": "CVE-2025-38681",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Race Condition within a Thread",
"title": "CWE-366"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including a race condition in ptdump and the VMSCAPE flaw in branch predictor isolation, were addressed across SUSE Linux Enterprise and Micro kernels from 15 SP6 to 16.0 and 6.2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38681 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38681.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38681"
},
{
"cve": "CVE-2025-38683",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Missing Synchronization",
"title": "CWE-820"
},
{
"category": "description",
"text": "Multiple Linux kernel updates for SUSE Linux Enterprise and Micro versions address numerous security vulnerabilities and non-security bugs across various subsystems including networking, filesystems, drivers, AMD processor issues, and kernel panic fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38683 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38683.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38683"
},
{
"cve": "CVE-2025-38684",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel architectures and subsystems, including a NULL pointer dereference in net/sched ets, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue, were fixed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38684 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38684.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38684"
},
{
"cve": "CVE-2025-38685",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel across various SUSE Linux Enterprise versions and architectures were fixed, including issues in fbdev, Bluetooth, networking, filesystems, device drivers, AMD processors, virtualization, and memory management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38685 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38685.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38685"
},
{
"cve": "CVE-2025-38687",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, architectures, and AMD processors\u2014including race conditions, use-after-free errors, CPU cache initialization flaws, and branch predictor isolation issues\u2014were fixed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38687 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38687.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38687"
},
{
"cve": "CVE-2025-38691",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems and architectures, including AMD CPU flaws, pNFS layout issues, and the VMSCAPE branch predictor isolation flaw, were addressed across SUSE Linux Enterprise and Micro kernel versions with extensive patches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38691 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38691.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38691"
},
{
"cve": "CVE-2025-38693",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting AMD processors, Linux kernel subsystems, and the VMSCAPE flaw in branch predictor isolation were fixed across SUSE Linux Enterprise and Micro kernels, addressing issues like null pointer dereferences, race conditions, use-after-free, and memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38693 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38693.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38693"
},
{
"cve": "CVE-2025-38694",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting AMD processors and various Linux kernel subsystems\u2014including memory management, networking, USB, SCSI, and CPU cache initialization\u2014were addressed across SUSE Linux Enterprise and Micro kernel versions with numerous CVE fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38694 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38694.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38694"
},
{
"cve": "CVE-2025-38695",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting AMD processors, Linux kernel subsystems, and drivers\u2014including a null pointer dereference in the SCSI lpfc driver and the VMSCAPE branch predictor isolation flaw\u2014were addressed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38695 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38695.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38695"
},
{
"cve": "CVE-2025-38696",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various CPU architectures and Linux kernel subsystems, including MIPS stack handling, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were fixed to prevent crashes, privilege escalation, and data leaks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38696 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38696.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38696"
},
{
"cve": "CVE-2025-38697",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel, including a critical out-of-bounds access flaw in the jfs filesystem and a branch predictor isolation issue (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38697 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38697.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38697"
},
{
"cve": "CVE-2025-38698",
"notes": [
{
"category": "description",
"text": "Multiple updates to the Linux kernel and SUSE Linux Enterprise products addressed numerous critical security vulnerabilities affecting AMD processors, various kernel subsystems, drivers, and filesystems, including fixes for data leakage, memory corruption, and branch predictor isolation flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38698 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38698.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38698"
},
{
"cve": "CVE-2025-38699",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others addressed critical vulnerabilities including a double-free flaw in the scsi bfa driver, CPU cache initialization issues on AMD processors, the VMSCAPE vulnerability, race conditions, and use-after-free bugs across various subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38699"
},
{
"cve": "CVE-2025-38700",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities across various architectures, subsystems, and drivers, including fixes for AMD CPU cache issues, iSER setup panics, and VMSCAPE branch predictor flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38700 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38700.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38700"
},
{
"cve": "CVE-2025-38701",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities including a branch predictor isolation flaw (VMSCAPE), CPU cache initialization issues, AMD processor data leaks, and ext4 filesystem error handling improvements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38701 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38701.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38701"
},
{
"cve": "CVE-2025-38702",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including fbdev, memory management, networking, schedulers, and hardware drivers, were addressed across SUSE Linux Enterprise and Micro kernel versions to prevent buffer overflows, data leakage, and privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38702 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38702.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38702"
},
{
"cve": "CVE-2025-38706",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including null pointer dereference, CPU cache initialization flaws, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were discovered and fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38706 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38706.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38706"
},
{
"cve": "CVE-2025-38707",
"notes": [
{
"category": "description",
"text": "A comprehensive Linux kernel update addressed multiple security vulnerabilities across various subsystems and architectures, including fixes for the NTFS3 file system, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38707 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38707.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38707"
},
{
"cve": "CVE-2025-38708",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "A comprehensive Linux kernel update addressed multiple security vulnerabilities across various architectures and subsystems, including fixes for DRBD use-after-free, AMD CPU cache flaws, AppArmor LSM issues, and the VMSCAPE branch predictor isolation vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38708 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38708.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38708"
},
{
"cve": "CVE-2025-38711",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel affecting various architectures, drivers, and subsystems\u2014including a deadlock in SMB server, AMD CPU issues, SEV-SNP memory integrity flaws, and the VMSCAPE branch predictor isolation vulnerability\u2014were fixed to enhance system security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38711 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38711.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38711"
},
{
"cve": "CVE-2025-38712",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including the VMSCAPE branch predictor isolation flaw, CPU cache initialization issues, and memory management bugs, were fixed across various Linux kernel versions and SUSE Enterprise products affecting numerous architectures and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38712 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38712.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38712"
},
{
"cve": "CVE-2025-38713",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including slab-out-of-bounds reads, use-after-free, race conditions, memory leaks, CPU cache initialization flaws, AMD processor data leakage, and the critical VMSCAPE branch predictor isolation flaw were fixed across various Linux kernel subsystems in SUSE Linux Enterprise and other distributions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38713 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38713.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38713"
},
{
"cve": "CVE-2025-38714",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including a slab-out-of-bounds issue in the Linux kernel\u0027s hfsplus_bnode_read() function and the VMSCAPE flaw affecting branch predictor isolation, were fixed across various SUSE Linux Enterprise and Linux kernel versions impacting numerous subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38714 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38714.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38714"
},
{
"cve": "CVE-2025-38715",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting AMD processors and various Linux kernel subsystems including HFS filesystem, coresight, sched, usb, scsi, KVM, netfilter, and others were fixed across SUSE Linux Enterprise and Micro kernels to prevent memory access violations, data leakage, and branch predictor isolation flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38715 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38715.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38715"
},
{
"cve": "CVE-2025-38721",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including a refcount leak in netfilter, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation issue were fixed across various Linux kernel versions and SUSE Enterprise products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38721 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38721.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38721"
},
{
"cve": "CVE-2025-38723",
"notes": [
{
"category": "description",
"text": "A vulnerability in the Linux kernel\u0027s LoongArch BPF implementation caused incorrect jump offset calculations in tail calls, leading to soft lockups, which was fixed by correcting the JIT context initialization and offset calculation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38723 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38723.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38723"
},
{
"cve": "CVE-2025-38724",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including use-after-free, race conditions, CPU cache flaws, and branch predictor isolation issues, were addressed across SUSE Linux Enterprise and Micro kernels with extensive patches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38724 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38724.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38724"
},
{
"cve": "CVE-2025-38725",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel versions, including SUSE Enterprise and Micro kernels, were addressed, covering issues in drivers, filesystems, CPU architectures (notably AMD), and virtualization subsystems such as the VMSCAPE flaw.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38725 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38725.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38725"
},
{
"cve": "CVE-2025-38727",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and bugs affecting Linux kernel components including netlink, schedulers, drivers, memory management, and GPU subsystems were fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38727 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38727"
},
{
"cve": "CVE-2025-38728",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including slab out-of-bounds in the smb3 subsystem, CPU cache initialization flaws, and AMD processor data leakage, were fixed across various SUSE Linux Enterprise versions and NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38728 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38728.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-38729",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel and AMD processors across various architectures, drivers, and subsystems were addressed, including issues like race conditions, memory leaks, use-after-free bugs, CPU cache initialization flaws, and branch predictor isolation (VMSCAPE).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38729 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38729.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38729"
},
{
"cve": "CVE-2025-38732",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"notes": [
{
"category": "other",
"text": "Improper Update of Reference Count",
"title": "CWE-911"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel versions and SUSE Linux Enterprise products, including issues like destination refcount leaks, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were addressed with extensive patches.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38732 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38732.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38732"
},
{
"cve": "CVE-2025-38735",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting SUSE Linux Enterprise kernels, including AMD processors, AppArmor LSM, and various kernel subsystems and drivers, were fixed to prevent kernel crashes, privilege escalation, data leaks, and integrity loss.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38735 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38735.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38735"
},
{
"cve": "CVE-2025-38736",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security fixes were applied across various SUSE Linux Enterprise and Micro kernel versions, addressing vulnerabilities such as race conditions, use-after-free bugs, memory leaks, null pointer dereferences, and a specific fix in the Linux kernel asix_devices USB network driver for PHY address masking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-38736 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-38736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-38736"
},
{
"cve": "CVE-2025-39673",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and race conditions affecting various Linux kernel subsystems, including ppp, scsi, net, drm, ACPI, and critical AMD CPU and SEV-SNP memory integrity issues, were fixed across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39673 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39673.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39673"
},
{
"cve": "CVE-2025-39675",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel and AMD processors across numerous subsystems and architectures, including null pointer dereferences, CPU cache initialization flaws, data leakage, and branch predictor isolation issues, were identified and addressed in various SUSE Linux Enterprise and Micro kernel updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39675 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39675.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39675"
},
{
"cve": "CVE-2025-39676",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Unexpected Status Code or Return Value",
"title": "CWE-394"
},
{
"category": "description",
"text": "Multiple Linux kernel updates, including SUSE Linux Enterprise and Micro versions, addressed numerous critical security vulnerabilities across various subsystems, drivers, and architectures, such as CPU cache initialization, AMD processor data leakage, and the VMSCAPE flaw involving branch predictor isolation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39676 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39676.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39676"
},
{
"cve": "CVE-2025-39681",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "other",
"text": "Divide By Zero",
"title": "CWE-369"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers\u2014including CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor flaw\u2014were fixed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39681 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39681.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39681"
},
{
"cve": "CVE-2025-39682",
"notes": [
{
"category": "description",
"text": "Multiple SUSE Linux Enterprise kernel updates address numerous security vulnerabilities including buffer overflows, use-after-free, race conditions, TLS zero-length record handling, malicious packet rejection, and constant-time MAC comparison across various subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39682 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39682.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39682"
},
{
"cve": "CVE-2025-39683",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others addressed numerous security vulnerabilities including KASAN slab-out-of-bounds, CPU cache initialization flaws, AMD processor data leakage, VMSCAPE branch predictor isolation, and local privilege escalation in AppArmor LSM across various kernel subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39683 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39683.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39683"
},
{
"cve": "CVE-2025-39684",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including AMD processors, SEV-SNP guest memory, and the VMSCAPE branch predictor flaw, were addressed across various SUSE Linux Enterprise and Micro kernel versions with extensive fixes in numerous subsystems and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39684 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39684.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39684"
},
{
"cve": "CVE-2025-39685",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including drivers, filesystems, networking, and virtualization components, were fixed across SUSE Linux Enterprise and Micro kernels, addressing issues like race conditions, use-after-free, memory leaks, and privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39685 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39685.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39685"
},
{
"cve": "CVE-2025-39686",
"notes": [
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting various Linux kernel versions and subsystems, including AMD processor flaws, race conditions, use-after-free bugs, and the VMSCAPE vulnerability, were fixed across SUSE Linux Enterprise and Linux Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39686 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39686.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39686"
},
{
"cve": "CVE-2025-39687",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel affecting various CPU architectures, drivers, and subsystems\u2014including the iio light as73211 driver and the VMSCAPE branch predictor isolation flaw\u2014were fixed to prevent data leakage and memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39687 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39687.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39687"
},
{
"cve": "CVE-2025-39689",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel affecting various CPU architectures, drivers, and subsystems\u2014including ftrace use-after-free bugs, AMD processor data leakage, SEV-SNP memory integrity, and VMSCAPE branch predictor isolation\u2014were fixed across SUSE Linux Enterprise and other distributions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39689 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39689.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39689"
},
{
"cve": "CVE-2025-39691",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including use-after-free bugs, branch predictor isolation flaws (VMSCAPE), and CPU cache initialization issues, were fixed across various Linux kernel subsystems and architectures, affecting SUSE Linux Enterprise and Micro products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39691 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39691.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39691"
},
{
"cve": "CVE-2025-39692",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple Linux kernel security updates addressed numerous vulnerabilities including improper CPU cache initialization affecting AMD processors and SEV-SNP guest memory, alongside fixes for local privilege escalation in AppArmor and kernel subsystem issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39692 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39692.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39692"
},
{
"cve": "CVE-2025-39693",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including drm/amd/display, AMD CPU cache, AppArmor LSM, and virtualization branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39693 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39693.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39693"
},
{
"cve": "CVE-2025-39694",
"cwe": {
"id": "CWE-1285",
"name": "Improper Validation of Specified Index, Position, or Offset in Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Index, Position, or Offset in Input",
"title": "CWE-1285"
},
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including s390/sclp, AMD CPU cache initialization, AppArmor, and others, were fixed across SUSE Linux Enterprise and Micro products, addressing issues such as improper memory access and data leakage.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39694 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39694.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39694"
},
{
"cve": "CVE-2025-39697",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including race conditions, use-after-free flaws, and branch predictor isolation issues, were identified and fixed across various Linux kernel subsystems and architectures, notably affecting SUSE Linux Enterprise and Micro distributions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39697 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39697.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39697"
},
{
"cve": "CVE-2025-39701",
"cwe": {
"id": "CWE-1025",
"name": "Comparison Using Wrong Factors"
},
"notes": [
{
"category": "other",
"text": "Comparison Using Wrong Factors",
"title": "CWE-1025"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel components, including ACPI\u0027s pfr_update driver, AMD processors, and SEV-SNP guest memory integrity, were discovered and addressed across SUSE Linux Enterprise and Micro kernel versions with extensive fixes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39701 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39701.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39701"
},
{
"cve": "CVE-2025-39702",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "description",
"text": "Multiple severe security vulnerabilities affecting various Linux kernel subsystems, including ipv6: sr MAC timing attacks, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were fixed across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39702 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39702.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39702"
},
{
"cve": "CVE-2025-39703",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Validation of Syntactic Correctness of Input",
"title": "CWE-1286"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including HSR network protocol, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernels with extensive updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39703 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39703.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39703"
},
{
"cve": "CVE-2025-39706",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE address numerous security vulnerabilities affecting AMD processors, various kernel subsystems, drivers, and architectures, including fixes for KFD debugfs, AppArmor LSM, and SEV-SNP guest memory issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39706 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39706.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39706"
},
{
"cve": "CVE-2025-39709",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems and AMD processors, including critical CPU cache initialization flaws, data leakage, and the VMSCAPE branch predictor isolation issue, were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39709 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39709.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39709"
},
{
"cve": "CVE-2025-39710",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and stability issues affecting various Linux kernel subsystems, architectures, and AMD processors were addressed across SUSE Linux Enterprise and Micro kernels, including fixes for the media: venus driver and the VMSCAPE vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39710 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39710"
},
{
"cve": "CVE-2025-39713",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and bugs affecting various Linux kernel components, including AMD CPU data leakage, race conditions, and branch predictor isolation flaws, were fixed across SUSE Linux Enterprise and Linux kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39713 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39713.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39713"
},
{
"cve": "CVE-2025-39714",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, CPU architectures including AMD processors, and drivers were fixed across SUSE Linux Enterprise and Micro kernels, including a critical VMSCAPE flaw involving branch predictor isolation between guest VMs and hypervisors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39714 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39714.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39714"
},
{
"cve": "CVE-2025-39715",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel affecting various architectures and subsystems, including parisc, CPU cache initialization, AMD processor data leakage, and AppArmor, were addressed to prevent unauthorized access and privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39715 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39715.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39715"
},
{
"cve": "CVE-2025-39716",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel affecting various architectures, including parisc and AMD processors, were fixed, addressing issues such as improper CPU cache initialization, data leakage, and privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39716 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39716.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39716"
},
{
"cve": "CVE-2025-39718",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel, including vsock/virtio SKB overflow, CPU cache initialization flaws, and AMD processor data leakage, were addressed across various SUSE Linux Enterprise and Micro kernel versions with extensive security and stability updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39718 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39718.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39718"
},
{
"cve": "CVE-2025-39719",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including out-of-bounds array access in the bno055 IMU driver and improper CPU cache initialization, were addressed in updates to SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39719 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39719.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39719"
},
{
"cve": "CVE-2025-39724",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting Linux kernel subsystems, including AMD CPU data leakage, SEV-SNP guest memory integrity, and the VMSCAPE branch predictor flaw, were fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39724 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39724.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39724"
},
{
"cve": "CVE-2025-39736",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "other",
"text": "Deadlock",
"title": "CWE-833"
},
{
"category": "description",
"text": "The Linux kernel addressed multiple security vulnerabilities across various architectures and subsystems, including AMD CPU cache flaws, the VMSCAPE branch predictor isolation issue, and deadlock fixes related to kmemleak_lock and netpoll interactions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39736 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39736.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39736"
},
{
"cve": "CVE-2025-39737",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "This Linux kernel update addresses multiple security vulnerabilities across various architectures and subsystems, including AMD CPU data leakage, SEV-SNP memory integrity flaws, VMSCAPE branch predictor isolation issues, and a soft lockup fix in kmemleak cleanup.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39737 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39737.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39737"
},
{
"cve": "CVE-2025-39738",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including btrfs subvolume relocation, CPU cache initialization, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39738 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39738.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39738"
},
{
"cve": "CVE-2025-39742",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "other",
"text": "Divide By Zero",
"title": "CWE-369"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE Linux Enterprise and others address a wide range of security vulnerabilities including divide-by-zero errors, race conditions, use-after-free, null pointer dereferences, information leaks, and CPU cache initialization flaws across various subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39742 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39742.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39742"
},
{
"cve": "CVE-2025-39743",
"notes": [
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting Linux kernel subsystems, drivers, filesystems, and architectures\u2014including the VMSCAPE flaw and CPU cache and AMD processor issues\u2014were fixed across SUSE Linux Enterprise and Micro product lines.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39743 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39743.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39743"
},
{
"cve": "CVE-2025-39749",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel architectures, subsystems, and drivers\u2014including data races in RCU, branch predictor isolation (VMSCAPE), AMD processor data leakage, and AppArmor flaws\u2014were addressed through extensive patches across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39749 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39749.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39749"
},
{
"cve": "CVE-2025-39752",
"cwe": {
"id": "CWE-364",
"name": "Signal Handler Race Condition"
},
"notes": [
{
"category": "other",
"text": "Signal Handler Race Condition",
"title": "CWE-364"
},
{
"category": "description",
"text": "A comprehensive Linux kernel update addresses multiple security vulnerabilities including ARM rockchip SMP initialization hangs, CPU cache initialization flaws, AMD processor data leaks, AppArmor LSM privilege escalations, and the VMSCAPE branch predictor isolation issue across various architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39752 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39752.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39752"
},
{
"cve": "CVE-2025-39756",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE Linux Enterprise and related distributions address critical security vulnerabilities across file descriptor allocation, networking, device drivers, CPU cache initialization, AMD processor data leakage, and branch predictor isolation flaws affecting various architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39756 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39756.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39756"
},
{
"cve": "CVE-2025-39757",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple Linux kernel updates, including SUSE Enterprise and Micro versions, addressed numerous security vulnerabilities such as memory leaks, race conditions, use-after-free bugs, AMD processor data leakage, and a VM branch predictor isolation flaw (VMSCAPE).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39757 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39757.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39757"
},
{
"cve": "CVE-2025-39759",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and race conditions in the Linux kernel, including btrfs qgroup use-after-free and AMD SEV-SNP guest memory issues, were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous subsystems and drivers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39759 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39759.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39759"
},
{
"cve": "CVE-2025-39760",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel and AMD processors across various architectures, drivers, and subsystems, including USB, Bluetooth, and virtualization, were addressed in updates for SUSE Linux Enterprise and related distributions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39760 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39760"
},
{
"cve": "CVE-2025-39766",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, architectures, and drivers\u2014including CPU cache initialization flaws, AMD data leakage, and the VMSCAPE branch predictor isolation issue\u2014were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39766 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39766.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39766"
},
{
"cve": "CVE-2025-39770",
"cwe": {
"id": "CWE-573",
"name": "Improper Following of Specification by Caller"
},
"notes": [
{
"category": "other",
"text": "Improper Following of Specification by Caller",
"title": "CWE-573"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and bugs affecting various Linux kernel versions, including SUSE Linux Enterprise and Micro kernels, were addressed, covering issues in IPv6 TSO handling, CPU cache initialization, AMD processor data leakage, and numerous subsystems such as coresight, schedulers, USB, SCSI, networking, and filesystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39770 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39770.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39770"
},
{
"cve": "CVE-2025-39772",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting Linux kernel subsystems, AMD processors, and virtualization components were addressed across various SUSE Linux Enterprise and Micro kernel versions, including fixes for NULL pointer dereferences, race conditions, and branch predictor isolation flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39772 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39772.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39772"
},
{
"cve": "CVE-2025-39773",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including timer overflow, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE branch predictor isolation flaw, were addressed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39773 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39773.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39773"
},
{
"cve": "CVE-2025-39776",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple Linux kernel vulnerabilities were fixed, including memory corruption in debug_vm_pgtable, CPU cache initialization flaws, AMD processor data leakage, AppArmor LSM issues, and the VMSCAPE branch predictor isolation flaw across various architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39776 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39776.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39776"
},
{
"cve": "CVE-2025-39782",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel components, including CPU architectures, drivers, filesystems, and subsystems such as jbd2_log_do_checkpoint and branch predictor isolation (VMSCAPE), were identified and addressed across SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39782 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39782.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39782"
},
{
"cve": "CVE-2025-39783",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel and AMD processors, including use-after-free bugs, CPU data leakage, SEV-SNP memory integrity issues, and the VMSCAPE flaw in branch predictor isolation, were fixed across various subsystems and architectures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39783 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39783.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39783"
},
{
"cve": "CVE-2025-39787",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel architectures, drivers, and subsystems\u2014including MDT loader buffer validation, CPU cache initialization, AMD processor data leakage, and branch predictor isolation (VMSCAPE)\u2014were identified and addressed in SUSE Linux Enterprise and Micro kernel updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39787 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39787.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39787"
},
{
"cve": "CVE-2025-39788",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and bugs affecting various Linux kernel subsystems, including scsi: ufs: exynos driver, CPU cache initialization, AMD processor data leakage, and branch predictor isolation, were fixed across SUSE Linux Enterprise and other kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39788 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39788.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39790",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting Linux kernel subsystems, including the MHI host driver, CPU cache initialization, AMD processors, and branch predictor isolation (VMSCAPE), were identified and patched across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39790 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39790.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39790"
},
{
"cve": "CVE-2025-39794",
"notes": [
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others fixed numerous security vulnerabilities including ARM Tegra I/O memcpy issues, CPU cache initialization flaws, AMD processor data leakage, and the VMSCAPE vulnerability across various architectures and subsystems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39794 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39794.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39794"
},
{
"cve": "CVE-2025-39795",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "A comprehensive Linux kernel update addressed multiple critical security vulnerabilities, including CPU cache memory initialization flaws, AMD processor data leakage, the VMSCAPE vulnerability, and various issues across numerous subsystems and architectures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39795 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39795"
},
{
"cve": "CVE-2025-39798",
"cwe": {
"id": "CWE-273",
"name": "Improper Check for Dropped Privileges"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Dropped Privileges",
"title": "CWE-273"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE address numerous critical security vulnerabilities including memory leaks, race conditions, use-after-free bugs, CPU cache and AMD processor flaws, and the VMSCAPE vulnerability affecting virtualization isolation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39798 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39798.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39798"
},
{
"cve": "CVE-2025-39800",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including btrfs metadata corruption, AMD processor flaws, and various subsystems such as memory management, networking, and drivers, were fixed across SUSE Linux Enterprise and Micro products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39800 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39800.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39800"
},
{
"cve": "CVE-2025-39801",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting AMD processors and various Linux kernel subsystems, including USB, networking, filesystems, and drivers, were identified and fixed across SUSE Linux Enterprise and Micro kernels, alongside a VMSCAPE flaw impacting branch predictor isolation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39801 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39801.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39801"
},
{
"cve": "CVE-2025-39806",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including HID multitouch, AppArmor, coresight, sched, USB, SCSI, KVM, and AMD processors, were identified and addressed across SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39806 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39806.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39806"
},
{
"cve": "CVE-2025-39808",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including a page fault in the hid-ntrig driver, flaws in AppArmor LSM, the VMSCAPE branch predictor isolation issue, and AMD Zen processor EntrySign flaw, were addressed across various SUSE Linux Enterprise and Micro kernel updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39808 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39808.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39808"
},
{
"cve": "CVE-2025-39812",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others address numerous security vulnerabilities across networking, filesystems, drivers, and subsystems including critical AppArmor LSM flaws and a branch predictor isolation issue (VMSCAPE).",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39812 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39812.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39812"
},
{
"cve": "CVE-2025-39813",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE address numerous security vulnerabilities including race conditions in ftrace, flaws in AppArmor LSM, AMD CPU microcode verification issues, and the VMSCAPE branch predictor isolation vulnerability across various subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39813 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39813.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39813"
},
{
"cve": "CVE-2025-39817",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel and AppArmor LSM affecting various subsystems such as efivarfs, crypto, bpf, cifs, and architectures were fixed, including slab-out-of-bounds, use-after-free, race conditions, and CPU microcode verification flaws.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39817 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39817"
},
{
"cve": "CVE-2025-39819",
"notes": [
{
"category": "description",
"text": "Multiple updates to SUSE Linux Enterprise kernels address numerous security vulnerabilities including inconsistent reference count handling in SMB filesystem, AppArmor LSM privilege escalations, and AMD Zen CPU microcode verification flaws.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39819 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39823",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "Multiple Linux kernel updates across SUSE Linux Enterprise and Micro versions addressed numerous security vulnerabilities including speculative execution side-channel mitigations, AppArmor LSM flaws, AMD CPU microcode issues, and branch predictor isolation (VMSCAPE), affecting various subsystems and drivers.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39823 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39823.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39823"
},
{
"cve": "CVE-2025-39824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including use-after-free in the ASUS HID driver, AppArmor LSM flaws, VMSCAPE branch predictor isolation, and CPU microcode signature issues in AMD Zen processors, affect various Linux kernel subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39824 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39824.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39824"
},
{
"cve": "CVE-2025-39825",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"notes": [
{
"category": "other",
"text": "Race Condition within a Thread",
"title": "CWE-366"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE address numerous security vulnerabilities including race conditions, use-after-free bugs, memory leaks, and critical flaws in the AppArmor LSM and AMD Zen CPU microcode verification across various architectures and subsystems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39825 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39825.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39825"
},
{
"cve": "CVE-2025-39826",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including race conditions, use-after-free bugs, privilege escalations, denial of service, and information leaks were fixed across various Linux kernel subsystems and the AppArmor LSM in SUSE Linux Enterprise and Micro kernels.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39826 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39826.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39826"
},
{
"cve": "CVE-2025-39827",
"notes": [
{
"category": "description",
"text": "Multiple Linux kernel updates, including SUSE Enterprise and Micro versions, address numerous security vulnerabilities such as slab-use-after-free, privilege escalation, denial of service, and information leaks across various subsystems, drivers, and architectures, with notable fixes in AppArmor LSM and AMD Zen microcode verification.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39827 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39827"
},
{
"cve": "CVE-2025-39828",
"notes": [
{
"category": "description",
"text": "Multiple critical security vulnerabilities, including flaws in the Linux kernel\u0027s ATM TCP driver, AppArmor LSM, and a branch predictor isolation issue (VMSCAPE), were fixed across various SUSE Linux Enterprise and Micro kernel versions affecting numerous architectures and subsystems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39828 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39828.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39828"
},
{
"cve": "CVE-2025-39835",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including XFS filesystem, AppArmor LSM, AMD processors, and branch predictor isolation (VMSCAPE), were fixed across SUSE Linux Enterprise and Micro kernels to prevent system crashes, privilege escalation, and data exposure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39835 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39835"
},
{
"cve": "CVE-2025-39838",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including NULL pointer dereferences, memory leaks, race conditions, and privilege escalation flaws in the Linux kernel and AppArmor module were addressed through extensive updates across SUSE Linux Enterprise and Micro kernels, as well as AMD processor microcode.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39838 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39838.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39838"
},
{
"cve": "CVE-2025-39839",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel versions and subsystems, including batman-adv, AppArmor, and AMD processors, were identified and fixed, addressing issues such as out-of-bounds reads/writes, race conditions, use-after-free, and information exposure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39839 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39839.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39839"
},
{
"cve": "CVE-2025-39841",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple critical security vulnerabilities affecting various Linux kernel subsystems, including SCSI drivers, AppArmor security module, memory management, and a branch predictor isolation flaw (VMSCAPE), were addressed in updates for SUSE Linux Enterprise and Linux kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39841 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39841.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39841"
},
{
"cve": "CVE-2025-39842",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities including null pointer dereferences in ocfs2, AppArmor LSM privilege escalations, and AMD Zen microcode flaws were fixed across various SUSE Linux Enterprise and Micro kernel versions, addressing memory leaks, race conditions, and driver issues.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39842 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39842.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39842"
},
{
"cve": "CVE-2025-39843",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "other",
"text": "Deadlock",
"title": "CWE-833"
},
{
"category": "other",
"text": "Improper Locking",
"title": "CWE-667"
},
{
"category": "description",
"text": "Multiple security vulnerabilities in the Linux kernel and AppArmor LSM, including a deadlock in the SLUB allocator and AMD CPU microcode verification flaws, were fixed to prevent denial of service, privilege escalation, and information leaks across numerous architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39843 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39843.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39843"
},
{
"cve": "CVE-2025-39844",
"notes": [
{
"category": "description",
"text": "Multiple security vulnerabilities affecting various Linux kernel subsystems, including AppArmor, memory management, drivers, and AMD processors, were discovered and addressed across SUSE Linux Enterprise and Micro kernels, involving privilege escalation, denial of service, and information exposure risks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39844 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39844.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39844"
},
{
"cve": "CVE-2025-39845",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and bugs affecting Linux kernel subsystems, including AppArmor LSM, x86/mm/64 paging, and AMD processors, were addressed in various SUSE Linux Enterprise and Micro kernel updates to fix privilege escalation, memory leaks, race conditions, and system crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39845 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39845.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39845"
},
{
"cve": "CVE-2025-39846",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including NULL pointer dereferences, race conditions, use-after-free, memory leaks, and privilege escalation flaws were addressed across various Linux kernel subsystems and architectures, affecting SUSE Linux Enterprise and other distributions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39846 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39846.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39846"
},
{
"cve": "CVE-2025-39847",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Resource after Effective Lifetime",
"title": "CWE-772"
},
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including memory leaks, privilege escalation, denial of service, and information leaks, were identified and fixed across various Linux kernel subsystems, drivers, and architectures, notably affecting SUSE Linux Enterprise and AppArmor modules.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39847 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39847.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39847"
},
{
"cve": "CVE-2025-39848",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
},
{
"category": "description",
"text": "Multiple security vulnerabilities and regressions affecting the Linux kernel, including the AppArmor security module, AMD CPU microcode verification, and subsystems like coresight, sched, usb, scsi, and netfilter, were fixed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39848 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39848.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39848"
},
{
"cve": "CVE-2025-39849",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including a critical SSID length bounds check fix in cfg80211, numerous AppArmor LSM flaws, and a critical AMD Zen CPU microcode signature verification issue, were addressed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39849 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39849"
},
{
"cve": "CVE-2025-39853",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting the Linux kernel, including the i40e driver, AppArmor LSM, and AMD CPU microcode, were fixed across various SUSE Linux Enterprise and Micro kernel versions to address privilege escalation, denial of service, and information leaks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39853 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39853.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39853"
},
{
"cve": "CVE-2025-39857",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including NULL pointer dereferences, race conditions, memory leaks, use-after-free bugs, and flaws in the AppArmor Linux kernel Security Module and AMD Zen microcode verification were addressed across various SUSE Linux Enterprise and Micro kernel versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39857 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39857.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39857"
},
{
"cve": "CVE-2025-39860",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities including use-after-free in Bluetooth, flaws in AppArmor LSM, branch predictor isolation (VMSCAPE), and AMD Zen CPU microcode loading were fixed across various Linux kernel versions and SUSE Enterprise products to address privilege escalation, denial of service, and information leaks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39860 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39860.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39860"
},
{
"cve": "CVE-2025-39864",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple security vulnerabilities, including use-after-free bugs, branch predictor isolation flaws (VMSCAPE), and issues in AppArmor LSM and AMD CPU microcode verification, were identified and fixed across various Linux kernel subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39864.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39864"
},
{
"cve": "CVE-2025-39865",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE and others address critical security vulnerabilities including NULL pointer dereferences, memory leaks, race conditions, branch predictor isolation flaws (VMSCAPE), and AMD CPU microcode signature verification issues across various subsystems and architectures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39865 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39865.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39865"
},
{
"cve": "CVE-2025-39866",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple Linux kernel updates from SUSE address critical security vulnerabilities including use-after-free, race conditions, privilege escalation, denial of service, information leaks, and the VMSCAPE branch predictor isolation flaw across various architectures and subsystems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-39866 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-39866.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-39866"
},
{
"cve": "CVE-2025-40300",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "other",
"text": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)",
"title": "CWE-402"
},
{
"category": "description",
"text": "Multiple Linux kernel updates address the VMSCAPE vulnerability and numerous other security issues including memory leaks, use-after-free, race conditions, and hardware-specific bugs across various subsystems and SUSE Linux Enterprise product lines.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40300 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40300.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40300"
},
{
"cve": "CVE-2025-40833",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Certain devices exhibit a null pointer dereference vulnerability in processing specific IPv4 requests, which can lead to a denial of service condition requiring manual system restart.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40833 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40833.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40833"
},
{
"cve": "CVE-2025-40946",
"cwe": {
"id": "CWE-321",
"name": "Use of Hard-coded Cryptographic Key"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Cryptographic Key",
"title": "CWE-321"
},
{
"category": "description",
"text": "A vulnerability in multiple BluePlanet device models allows attackers to derive Technical Service credentials from device serial numbers using a CRC16-based algorithm, enabling unauthorized access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40946 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40946.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40946"
},
{
"cve": "CVE-2025-40947",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "description",
"text": "A vulnerability in multiple RUGGEDCOM ROX device models below version V2.17.1 allows authenticated remote attackers to execute arbitrary commands with root privileges due to improper sanitization of user input during feature key installation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40947 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40947.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40947"
},
{
"cve": "CVE-2025-40948",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"title": "CWE-88"
},
{
"category": "description",
"text": "A vulnerability in RUGGEDCOM ROX devices below version 2.17.1 allows authenticated remote attackers to read arbitrary files with root privileges via improper input validation in the web server\u0027s JSON-RPC interface.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40948 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40948.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40948"
},
{
"cve": "CVE-2025-40949",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "description",
"text": "A command injection vulnerability in RUGGEDCOM ROX devices below version 2.17.1 allows authenticated remote attackers to execute arbitrary commands with root privileges via the Scheduler functionality in the Web UI.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40949 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40949.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-40949"
},
{
"cve": "CVE-2025-43368",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple use-after-free vulnerabilities and memory management issues in WebKitGTK, Safari, iOS, iPadOS, macOS, and Oracle Java SE 8u471-b50 were fixed to prevent crashes, memory corruption, and potential system compromise from malicious web content.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43368 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43368.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-43368"
},
{
"cve": "CVE-2025-46836",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "Net-tools versions up to 2.10 contain multiple stack-based buffer overflow vulnerabilities, including CVE-2025-46836, due to missing bounds checks in interface label handling and unsafe memory operations, potentially allowing arbitrary code execution or crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-46836 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-46836.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-46836"
},
{
"cve": "CVE-2025-47219",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affect GStreamer plugins, Oracle Java SE 8u471-b50\u0027s JavaFX gstreamer component, and Oracle Database Server\u0027s GraalVM engine, including heap buffer over-reads and unauthorized data access risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47219 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-47219"
},
{
"cve": "CVE-2025-48989",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Apache Tomcat versions 9.0.0.M1 to 11.0.9 are vulnerable to the MadeYouReset denial of service attack exploiting improper HTTP/2 stream resets, with multiple updates released to address this and other related security and stability issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48989 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Expired Pointer Dereference",
"title": "CWE-825"
},
{
"category": "description",
"text": "Multiple vulnerabilities in libxml2, including heap use after free, type confusion, stack buffer overflow, and integer overflow, can lead to denial of service, crashes, or data manipulation in affected Oracle products and other environments.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49794 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49794.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-49794"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities in libxml2, including heap use-after-free, type confusion, stack buffer overflow, integer overflow, and null pointer dereference, can lead to denial of service, crashes, or unauthorized data modification.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49796 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-53057",
"cwe": {
"id": "CWE-838",
"name": "Inappropriate Encoding for Output Context"
},
"notes": [
{
"category": "other",
"text": "Inappropriate Encoding for Output Context",
"title": "CWE-838"
},
{
"category": "description",
"text": "Multiple vulnerabilities including CVE-2025-53057, CVE-2025-53066, and CVE-2025-61748 affect Oracle Java SE and OpenJDK versions 8u461 through 25, allowing unauthenticated network attackers to access and modify critical data via APIs with a CVSS score of 5.9.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53057 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-53057"
},
{
"cve": "CVE-2025-53066",
"notes": [
{
"category": "description",
"text": "Multiple critical vulnerabilities (CVE-2025-53057, CVE-2025-53066, CVE-2025-61748) in Oracle Java SE and GraalVM across versions 8u461, 11.0.28, 17.0.16, 21.0.8, and 25 allow unauthenticated attackers to gain unauthorized access and modify sensitive data via APIs and XML External Entity attacks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53066 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53066.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-53066"
},
{
"cve": "CVE-2025-55752",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "description",
"text": "Multiple Apache Tomcat versions up to 11.0.13 suffer from directory traversal and URL normalization vulnerabilities that allow bypassing security constraints and potential remote code execution via PUT requests, alongside other issues like denial of service and improper input handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55752 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55752.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-55752"
},
{
"cve": "CVE-2025-55754",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Apache Tomcat versions up to 11.0.10, 10.1.44, and 9.0.108 include improper neutralization of ANSI escape sequences in log messages, directory traversal with possible remote code execution, denial of service, and other security issues, with fixes in later versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55754 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55754.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-55754"
},
{
"cve": "CVE-2025-61748",
"cwe": {
"id": "CWE-581",
"name": "Object Model Violation: Just One of Equals and Hashcode Defined"
},
"notes": [
{
"category": "other",
"text": "Object Model Violation: Just One of Equals and Hashcode Defined",
"title": "CWE-581"
},
{
"category": "description",
"text": "Multiple security vulnerabilities affecting Oracle Java SE, Oracle GraalVM, NetApp products, IBM Java, and OpenJDK versions 21 and 25 involve unauthorized data modification, encoded string handling, XML External Entity attacks, and certificate handling with CVSS scores up to 3.7.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61748 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61748.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-61748"
},
{
"cve": "CVE-2025-61795",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Multiple Apache Tomcat versions up to 11.0.13, 10.1.48, and 9.0.115 contain vulnerabilities including denial of service from delayed cleanup of multipart upload files, directory traversal with possible remote code execution, and improper input neutralization.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61795 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2025-61795"
},
{
"cve": "CVE-2026-2673",
"cwe": {
"id": "CWE-757",
"name": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)"
},
"notes": [
{
"category": "other",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "description",
"text": "OpenSSL versions 3.5.x and 3.6.x contain a TLS 1.3 key exchange group selection flaw involving the \u0027DEFAULT\u0027 keyword that affects post-quantum group negotiation, alongside multiple other security vulnerabilities including memory handling and RSA KEM issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-2673 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-2673.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-2673"
},
{
"cve": "CVE-2026-21925",
"cwe": {
"id": "CWE-322",
"name": "Key Exchange without Entity Authentication"
},
"notes": [
{
"category": "other",
"text": "Key Exchange without Entity Authentication",
"title": "CWE-322"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle Java SE and GraalVM RMI components across various versions allow unauthenticated network attackers to gain unauthorized access, with updates addressing security flaws in RMI, AWT/JavaFX, Networking, and Security components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21925 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21925.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-21925"
},
{
"cve": "CVE-2026-21932",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Type of Input",
"title": "CWE-1287"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle Java SE and GraalVM components including RMI, AWT, JavaFX, Networking, and Security allow unauthenticated remote attackers to compromise data integrity and execute attacks across various supported Java versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21932 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21932.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-21932"
},
{
"cve": "CVE-2026-21933",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"title": "CWE-93"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle Java SE and GraalVM components across various versions allow unauthenticated remote attackers to access, modify data, execute code, or redirect users, with updates addressing issues in RMI, AWT/JavaFX, Networking, and Security components.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21933 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21933.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-21933"
},
{
"cve": "CVE-2026-21945",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "description",
"text": "Multiple critical vulnerabilities in Oracle Java SE and GraalVM affect components such as RMI, AWT/JavaFX, Networking, and Security, allowing unauthenticated remote attackers to cause denial of service, execute code, steal information, or modify files across various Java versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21945 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21945.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-21945"
},
{
"cve": "CVE-2026-21947",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "Oracle Java SE JavaFX 8u471-b50 contains a difficult-to-exploit vulnerability allowing unauthenticated network attackers with user interaction to modify data in sandboxed applications, while GraalVM Multilingual Engine has a non-exploitable security-in-depth issue in Oracle Database Server.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21947 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21947.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-21947"
},
{
"cve": "CVE-2026-22924",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 versions below V5.0 allows unauthenticated connections and resource exhaustion, potentially disrupting operations and compromising system availability and integrity.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-22924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-22924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-22924"
},
{
"cve": "CVE-2026-22925",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "A vulnerability in SIMATIC CN 4100 versions below V5.0 allows denial-of-service by exhausting system resources through a high volume of TCP SYN packets.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-22925 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-22925.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-22925"
},
{
"cve": "CVE-2026-25786",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "Certain devices fail to properly validate and sanitize PLC/station names on the web interface\u0027s communication parameters page, enabling authenticated users with project download rights to inject malicious scripts executed upon page access by legitimate users.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-25786 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-25786.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-25786"
},
{
"cve": "CVE-2026-25787",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "A vulnerability in the \u0027Motion Control Diagnostics\u0027 web page allows authenticated users with project download rights to inject malicious scripts via improper validation of Technology Object names, enabling script execution in other users\u0027 sessions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-25787 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-25787.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-25787"
},
{
"cve": "CVE-2026-25789",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "Certain devices fail to properly validate filenames on their Firmware Update page, allowing remote attackers to execute malicious JavaScript through social engineering, potentially leading to session hijacking or credential theft.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-25789 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-25789.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-25789"
},
{
"cve": "CVE-2026-27446",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "other",
"text": "Missing Authentication for Critical Function",
"title": "CWE-306"
},
{
"category": "description",
"text": "A missing authentication vulnerability in Apache Artemis and ActiveMQ Artemis Core protocol allows unauthenticated remote attackers to inject or exfiltrate messages by forcing brokers to connect to rogue brokers in affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-27446 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-27446.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-27446"
},
{
"cve": "CVE-2026-27662",
"cwe": {
"id": "CWE-1188",
"name": "Initialization of a Resource with an Insecure Default"
},
"notes": [
{
"category": "other",
"text": "Initialization of a Resource with an Insecure Default",
"title": "CWE-1188"
},
{
"category": "description",
"text": "Affected devices inadequately restrict web browser access via the Control Panel, enabling unauthenticated attackers to gain unauthorized access and potentially exploit system vulnerabilities.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-27662 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-27662.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-27662"
},
{
"cve": "CVE-2026-28387",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple OpenSSL versions contain critical vulnerabilities including use-after-free in DANE client code, NULL pointer dereferences, heap buffer overflows, and RSA KEM failure handling issues, affecting TLS and cryptographic operations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28387 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28387.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-28387"
},
{
"cve": "CVE-2026-28388",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "A NULL pointer dereference vulnerability in OpenSSL\u0027s delta CRL processing can cause application crashes and Denial of Service, with exploitation requiring specific conditions and assessed as low severity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28388 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28388.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-28388"
},
{
"cve": "CVE-2026-28389",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple OpenSSL vulnerabilities including NULL pointer dereferences in CMS KeyAgreeRecipientInfo processing, use-after-free, heap buffer overflow, and TLS 1.3 key agreement issues can cause application crashes and Denial of Service, affecting various OpenSSL versions and some NetApp products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28389 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28389.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-28389"
},
{
"cve": "CVE-2026-28390",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "A NULL pointer dereference vulnerability (CVE-2026-28390) in OpenSSL occurs during processing of crafted CMS EnvelopedData messages with KeyTransportRecipientInfo using RSA-OAEP, potentially causing application crashes and Denial of Service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28390 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28390.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-28390"
},
{
"cve": "CVE-2026-31789",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple OpenSSL vulnerabilities including a heap buffer overflow in hexadecimal conversion on 32-bit platforms, use-after-free, NULL pointer dereferences, TLS 1.3 key agreement issues, and RSA KEM failure handling have been identified, affecting various versions and products.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-31789 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-31789.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-31789"
},
{
"cve": "CVE-2026-31790",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Access of Uninitialized Pointer",
"title": "CWE-824"
},
{
"category": "description",
"text": "OpenSSL\u0027s RSASVE key encapsulation vulnerability (CVE-2026-31790) allows sensitive data leakage from uninitialized memory due to improper handling of RSA_public_encrypt() failures and invalid RSA public key validation, affecting multiple products including Oracle Database Server and NetApp devices.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-31790 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-31790.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-31790"
},
{
"cve": "CVE-2026-33862",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "description",
"text": "Multiple versions of Teamcenter contain a vulnerability where improper encoding or filtering of user-supplied data allows attackers to inject malicious code that executes when other users access the affected content.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-33862 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-33862.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-33862"
},
{
"cve": "CVE-2026-33893",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "description",
"text": "Multiple versions of Teamcenter contain hardcoded obfuscation keys embedded in the application, which attackers can extract to gain unauthorized access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-33893 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-33893.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-33893"
},
{
"cve": "CVE-2026-40175",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)",
"title": "CWE-113"
},
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "other",
"text": "Improperly Controlled Modification of Dynamically-Determined Object Attributes",
"title": "CWE-915"
},
{
"category": "description",
"text": "Axios versions prior to 1.15.0 and 0.3.1 contain a prototype pollution vulnerability exploitable via a header injection gadget chain, enabling escalation to remote code execution or full cloud compromise including AWS IMDSv2 bypass.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-40175 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-40175.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-40175"
},
{
"cve": "CVE-2026-41125",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"title": "CWE-89"
},
{
"category": "description",
"text": "An SQL injection vulnerability in the KACO Meteor server of blueplanet devices allows an authorized local network attacker to escalate privileges.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41125 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41125.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-41125"
},
{
"cve": "CVE-2026-41551",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "description",
"text": "A path traversal vulnerability in ROS# versions prior to V2.2.2 allows remote attackers to access arbitrary files due to improper sanitization of user input.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-41551 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-41551.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-41551"
},
{
"cve": "CVE-2026-44411",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"notes": [
{
"category": "other",
"text": "Access of Uninitialized Pointer",
"title": "CWE-824"
},
{
"category": "description",
"text": "A vulnerability in Solid Edge SE2026 versions before V226.0 Update 5 allows remote code execution via uninitialized pointer access during parsing of specially crafted PAR files.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-44411 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-44411.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-44411"
},
{
"cve": "CVE-2026-44412",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "A stack-based buffer overflow vulnerability in Solid Edge SE2026 (all versions before V226.0 Update 5) when parsing specially crafted PAR files could enable code execution within the current process context.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-44412 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-44412.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36",
"CSAFPID-37",
"CSAFPID-38",
"CSAFPID-39",
"CSAFPID-40",
"CSAFPID-41",
"CSAFPID-42",
"CSAFPID-43",
"CSAFPID-44",
"CSAFPID-45",
"CSAFPID-46"
]
}
],
"title": "CVE-2026-44412"
}
]
}
NCSC-2026-0030
Vulnerability from csaf_ncscnl - Published: 2026-01-21 10:11 - Updated: 2026-01-21 10:11Multiple vulnerabilities across Oracle Java SE, libxml2, and Oracle Communications Cloud Native Core Certificate Management could lead to denial of service through various exploits, affecting system integrity and availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Oracle GraalVM Enterprise Edition
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle GraalVM for JDK
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle JDK Mission Control
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Java SE
|
vers:unknown/* |
Recent vulnerabilities in Oracle Java SE and GLib's GString memory management expose systems to potential denial of service and memory corruption risks, with specific integer overflow issues identified.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Oracle GraalVM Enterprise Edition
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle GraalVM for JDK
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle JDK Mission Control
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Java SE
|
vers:unknown/* |
Multiple vulnerabilities across Oracle Java SE, Oracle Communications Cloud Native Core, and libxslt expose systems to significant risks, including unauthorized data manipulation and application crashes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Oracle GraalVM Enterprise Edition
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle GraalVM for JDK
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle JDK Mission Control
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Java SE
|
vers:unknown/* |
Multiple vulnerabilities in Oracle JDK Mission Control and lz4-java allow unauthorized access and denial of service through untrusted input, with varying severity and required versions for mitigation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Oracle GraalVM Enterprise Edition
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle GraalVM for JDK
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle JDK Mission Control
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Java SE
|
vers:unknown/* |
Recent vulnerabilities in Oracle Java SE and WebKitGTK components highlight significant security risks, including a critical flaw in JavaFX allowing unauthenticated access and multiple use-after-free issues in web browsers leading to potential crashes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Oracle GraalVM Enterprise Edition
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle GraalVM for JDK
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle JDK Mission Control
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Java SE
|
vers:unknown/* |
Recent vulnerabilities in Oracle Java SE and GStreamer components expose systems to unauthorized data access and information disclosure through flawed parsing mechanisms and memory handling.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Oracle GraalVM Enterprise Edition
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle GraalVM for JDK
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle JDK Mission Control
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Java SE
|
vers:unknown/* |
A vulnerability in Oracle Java SE and Oracle GraalVM products allows unauthenticated attackers with network access to compromise data, potentially leading to unauthorized access and modifications across several supported versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Oracle GraalVM Enterprise Edition
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle GraalVM for JDK
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle JDK Mission Control
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Java SE
|
vers:unknown/* |
A vulnerability in Oracle Java SE and GraalVM products allows unauthenticated network attackers to compromise systems, affecting versions 8u471, 11.0.29, 17.0.17, and 21.0.9, with a CVSS score of 7.4.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Oracle GraalVM Enterprise Edition
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle GraalVM for JDK
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle JDK Mission Control
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Java SE
|
vers:unknown/* |
A vulnerability in Oracle Java SE and Oracle GraalVM products allows unauthenticated attackers with network access to compromise systems, potentially leading to unauthorized data access requiring human interaction for exploitation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Oracle GraalVM Enterprise Edition
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle GraalVM for JDK
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle JDK Mission Control
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Java SE
|
vers:unknown/* |
A vulnerability in Oracle Java SE and Oracle GraalVM products enables unauthenticated attackers to execute denial of service attacks, particularly in environments running untrusted code.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Oracle GraalVM Enterprise Edition
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle GraalVM for JDK
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle JDK Mission Control
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Java SE
|
vers:unknown/* |
A vulnerability in Oracle Java SE (JavaFX component) version 8u471-b50 allows unauthenticated attackers with network access to compromise systems, requiring human interaction for exploitation and potentially leading to unauthorized data access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Oracle GraalVM Enterprise Edition
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle GraalVM for JDK
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle JDK Mission Control
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Java SE
|
vers:unknown/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in Oracle Java SE.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden, met name in de JavaFX-component, stellen ongeauthenticeerde aanvallers in staat om systemen te compromitteren via onbetrouwbare code, wat kan leiden tot Denial of Service (DoS) aanvallen en ongeautoriseerde toegang tot gevoelige gegevens. De exploitatie van deze kwetsbaarheden vereist menselijke interactie, wat de complexiteit van de aanval verhoogt.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://www.oracle.com/security-alerts/cpujan2026.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Java",
"tracking": {
"current_release_date": "2026-01-21T10:11:39.759123Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0030",
"initial_release_date": "2026-01-21T10:11:39.759123Z",
"revision_history": [
{
"date": "2026-01-21T10:11:39.759123Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Oracle GraalVM Enterprise Edition"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Oracle GraalVM for JDK"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Oracle JDK Mission Control"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "Oracle Java SE"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Java SE, libxml2, and Oracle Communications Cloud Native Core Certificate Management could lead to denial of service through various exploits, affecting system integrity and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6021 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6021.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-6021"
},
{
"cve": "CVE-2025-6052",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Java SE and GLib\u0027s GString memory management expose systems to potential denial of service and memory corruption risks, with specific integer overflow issues identified.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6052 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6052.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-6052"
},
{
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Java SE, Oracle Communications Cloud Native Core, and libxslt expose systems to significant risks, including unauthorized data manipulation and application crashes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7425 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-7425"
},
{
"cve": "CVE-2025-12183",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle JDK Mission Control and lz4-java allow unauthorized access and denial of service through untrusted input, with varying severity and required versions for mitigation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-12183 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-12183.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-12183"
},
{
"cve": "CVE-2025-43368",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Java SE and WebKitGTK components highlight significant security risks, including a critical flaw in JavaFX allowing unauthenticated access and multiple use-after-free issues in web browsers leading to potential crashes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43368 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43368.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-43368"
},
{
"cve": "CVE-2025-47219",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Java SE and GStreamer components expose systems to unauthorized data access and information disclosure through flawed parsing mechanisms and memory handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-47219 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-47219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-47219"
},
{
"cve": "CVE-2026-21925",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle Java SE and Oracle GraalVM products allows unauthenticated attackers with network access to compromise data, potentially leading to unauthorized access and modifications across several supported versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21925 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21925.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2026-21925"
},
{
"cve": "CVE-2026-21932",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle Java SE and GraalVM products allows unauthenticated network attackers to compromise systems, affecting versions 8u471, 11.0.29, 17.0.17, and 21.0.9, with a CVSS score of 7.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21932 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21932.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2026-21932"
},
{
"cve": "CVE-2026-21933",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle Java SE and Oracle GraalVM products allows unauthenticated attackers with network access to compromise systems, potentially leading to unauthorized data access requiring human interaction for exploitation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21933 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21933.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2026-21933"
},
{
"cve": "CVE-2026-21945",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle Java SE and Oracle GraalVM products enables unauthenticated attackers to execute denial of service attacks, particularly in environments running untrusted code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21945 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21945.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2026-21945"
},
{
"cve": "CVE-2026-21947",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle Java SE (JavaFX component) version 8u471-b50 allows unauthenticated attackers with network access to compromise systems, requiring human interaction for exploitation and potentially leading to unauthorized data access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21947 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21947.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2026-21947"
}
]
}
CERTFR-2026-AVI-0069
Vulnerability from certfr_avis - Published: 2026-01-21 - Updated: 2026-01-21
De multiples vulnérabilités ont été découvertes dans Oracle Java SE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Java SE | Oracle Java SE versions 11.0.29, 17.0.17, 21.0.9 et 25.0.1 | ||
| Oracle | Java SE | Oracle JDK Mission Control version 9.1.1 | ||
| Oracle | Java SE | Oracle Java SE versions 8u471, 8u471-b50 et 8u471-perf | ||
| Oracle | Java SE | Oracle GraalVM Enterprise Edition version 21.3.16 | ||
| Oracle | Java SE | Oracle GraalVM pour JDK versions 17.0.17 et 21.0.9 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Java SE versions 11.0.29, 17.0.17, 21.0.9 et 25.0.1",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JDK Mission Control version 9.1.1",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE versions 8u471, 8u471-b50 et 8u471-perf",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle GraalVM Enterprise Edition version 21.3.16",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle GraalVM pour JDK versions 17.0.17 et 21.0.9",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-43368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43368"
},
{
"name": "CVE-2025-43356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43356"
},
{
"name": "CVE-2025-43272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43272"
},
{
"name": "CVE-2025-47183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47183"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2025-43342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43342"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-12183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12183"
}
],
"initial_release_date": "2026-01-21T00:00:00",
"last_revision_date": "2026-01-21T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0069",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Java SE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java SE",
"vendor_advisories": [
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Java SE cpujan2026",
"url": "https://www.oracle.com/security-alerts/cpujan2026.html"
}
]
}
CERTFR-2026-AVI-0218
Vulnerability from certfr_avis - Published: 2026-02-26 - Updated: 2026-02-26
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Platform Services pour Tanzu Platform versions antérieures à 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.5 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.12.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 4.3.2 sur Kubernetes | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.238.x | ||
| VMware | Workstation | Workstation versions antérieures à 25H2u1 | ||
| VMware | Fusion | Fusion versions antérieures à 25H2u1 sur MacOS | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.1065.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.16.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.95.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.8.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 14.21.0 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Platform Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.12.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.2 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.2.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.238.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation versions ant\u00e9rieures \u00e0 25H2u1",
"product": {
"name": "Workstation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions ant\u00e9rieures \u00e0 25H2u1 sur MacOS",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.1065.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.16.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.95.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.8.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 14.21.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2026-22722",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22722"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-62727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2025-58190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58190"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2022-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2255"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7545"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-47008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47008"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-11840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11840"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38417"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-1181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1181"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2023-25586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25586"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2017-20052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-20052"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0840"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2025-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1179"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2026-22715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22715"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-47007",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47007"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2022-4285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4285"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2026-22716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22716"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"name": "CVE-2022-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47695"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2022-50458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50458"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2026-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0994"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2016-9840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9840"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2023-53107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53107"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1182"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2008-0888",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2023-25584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25584"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-11082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11082"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-1149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1149"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2022-50444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50444"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2021-46174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46174"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53164"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2023-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2022-48065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48065"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2022-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47696"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2022-35205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35205"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2025-1178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1178"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-1176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1176"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2025-12119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12119"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-34410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34410"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-47911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47911"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2022-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49920"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2022-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50247"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-12383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12383"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2022-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50249"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2023-53182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53182"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2025-11083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11083"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-33285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33285"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-11081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11081"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2026-22184",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22184"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2022-48063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48063"
},
{
"name": "CVE-2024-53589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53589"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2023-32181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32181"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-11495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2019-9076",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9076"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2021-20205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20205"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2022-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50250"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2021-29390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29390"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2021-20284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20284"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2023-32573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2020-19726",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19726"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-47010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47010"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2022-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2024-57360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57360"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2023-37369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37369"
},
{
"name": "CVE-2024-48615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48615"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-0665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2018-9996",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9996"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2025-8225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8225"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2025-8224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8224"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5245"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2025-11966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11966"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2022-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47011"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-12194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12194"
},
{
"name": "CVE-2021-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3549"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-5244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5244"
},
{
"name": "CVE-2021-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37972"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2023-4863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2025-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1153"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2022-35206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35206"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2022-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38533"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2023-36660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36660"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-25585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25585"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-3198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3198"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2026-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2007"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-11839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11839"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2026-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0900"
},
{
"name": "CVE-2020-16599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
},
{
"name": "CVE-2021-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46822"
},
{
"name": "CVE-2022-45703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45703"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2022-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47673"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2021-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20197"
},
{
"name": "CVE-2023-24056",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
},
{
"name": "CVE-2026-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0902"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2026-22717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22717"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-29480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29480"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2023-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1999"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-7546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7546"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2025-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1148"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2021-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2023-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38197"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-64702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64702"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-26T00:00:00",
"last_revision_date": "2026-02-26T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0218",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37096"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37092"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37102"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37078"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37109"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37087",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37087"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37090",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37090"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37077",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37077"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37098"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37079",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37079"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37101"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37104",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37104"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37080",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37080"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37097"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37083",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37083"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37086",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37086"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37082",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37082"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37100"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37099"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37081",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37081"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37089",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37089"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37076",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37076"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37088",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37088"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36986",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37103"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37084",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37084"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37110"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37093"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37085",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37085"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37095"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37094"
}
]
}
CERTFR-2026-AVI-0565
Vulnerability from certfr_avis - Published: 2026-05-12 - Updated: 2026-05-12
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V3 CPUs toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X208PRO (6GK5208-0HA10-2AA6) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions antérieures à 8.3 | ||
| Siemens | N/A | SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC HMI MTP1000 Unified Comfort Panel (6AV2128-3KB06-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE X224 (6GK5224-0BA00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP2200 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3XB27-0BX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE SC646-2C (6GK5646-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200S IM 151-8F PN/DP CPU (6ES7151-8FB01-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE X310 (6GK5310-0FA00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V2 CPUs toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SCALANCE XM408-4C (6GK5408-4GP00-2AM2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) versions antérieures à 8.3 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DK00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SIMATIC HMI MTP1500 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3QB57-0BX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE X308-2 (6GK5308-2FL00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP2200 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3XB57-0BX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC HMI MTP700 Unified Comfort Panel (6AV2128-3GB06-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR528-6M (6GK5528-0AA00-2AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP Open Controller CPU 1515SP PC3 V4 CPUs toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SIMATIC HMI MTP1500 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3QB27-1BX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC HMI MTP1500 Unified Comfort Panel (6AV2128-3QB06-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SIMATIC CFU PA (6ES7655-5PX11-0XX0) versions antérieures à 2.0.0 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) versions antérieures à 8.3 | ||
| Siemens | N/A | SIMATIC HMI MTP1500 Unified Comfort Panel neutral design (6AV2128-3QB36-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC CFU PA (6ES7655-5PX11-1XX0) versions antérieures à 2.0.0 | ||
| Siemens | N/A | SIMATIC HMI MTP1500 Unified Comfort Panel hygienic (6AV2128-3QB40-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE X212-2 (6GK5212-2BB00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIPROTEC 5 versions supérieures ou égales à7.80 pour la vulnérabilité CVE-2024-54017 | ||
| Siemens | N/A | SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE XF204-2 (6GK5204-2BC00-2AF2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X310FE (6GK5310-0BA00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC HMI MTP1500 Unified Comfort Panel hygienic neutral design (6AV2128-3QB70-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC HMI MTP1200 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3MB57-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC ET 200pro IM 154-8F PN/DP CPU (6ES7154-8FB01-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SIMATIC HMI MTP1000 Unified Comfort Panel hygienic neutral design (6AV2128-3KB70-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC HMI MTP1900 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3UB27-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC HMI MTP2200 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3XB27-1BX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC S7 PLCs Web Server versions antérieures à 2.9.9 | ||
| Siemens | N/A | SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X204-2LD (6GK5204-2BC10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XF204 (6GK5204-0BA00-2AF2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X308-2M (6GK5308-2GG10-2AA2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC HMI MTP1900 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3UB57-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SIPROTEC 5 versions supérieures ou égales à7.80 et versions antérieures à 11.0 | ||
| Siemens | N/A | SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X307-3 (6GK5307-3BL10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP1900 Unified Comfort Panel (6AV2128-3UB06-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SIMATIC CN 4100 versions antérieures à 5.0 | ||
| Siemens | N/A | SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions antérieures à 8.3 | ||
| Siemens | N/A | SIMATIC HMI MTP1500 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3QB57-1BX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE MUB852-1 (A1) (6GK5852-1EA10-1AA1) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE X308-2M (6GK5308-2GG00-2AA2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP2200 Unified Comfort Panel (6AV2128-3XB06-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE MUB852-1 (B1) (6GK5852-1EA10-1BA1) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE X204-2 (6GK5204-2BB10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X212-2LD (6GK5212-2BC00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SIMATIC HMI MTP1500 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3QB27-0BX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC HMI MTP2200 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3XB57-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0) versions antérieures à 2.9.9 | ||
| Siemens | N/A | SCALANCE XR552-12M (6GK5552-0AA00-2AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC HMI MTP2200 Unified Comfort Panel neutral design (6AV2128-3XB36-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC HMI MTP1900 Unified Comfort Panel hygienic (6AV2128-3UB40-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DJ00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SIMATIC HMI MTP1500 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3QB57-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC ET 200pro IM 154-8FX PN/DP CPU (6ES7154-8FX00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DK00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DK01-0AB0) versions antérieures à 2.9.9 | ||
| Siemens | N/A | SIMATIC HMI MTP1000, Unified Comfort Panel neutral (6AV2128-3KB36-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE X308-2LH (6GK5308-2FN10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SIMATIC HMI MTP1900 Unified Comfort Panel hygienic neutral design (6AV2128-3UB70-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC S7 PLCs Web Server versions antérieures à 3.1.6 | ||
| Siemens | N/A | SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SCALANCE X307-3 (6GK5307-3BL00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0) versions antérieures à 2.9.9 | ||
| Siemens | N/A | SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE X308-2M TS (6GK5308-2GG00-2CA2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE X204-2FM (6GK5204-2BB11-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SCALANCE X304-2FE (6GK5304-2BD00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE X308-2LH (6GK5308-2FN00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC S7 PLCs Web Server toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SIMATIC ET 200pro IM 154-8 PN/DP CPU (6ES7154-8AB01-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC HMI MTP1200 Unified Comfort Panel hygienic neutral design (6AV2128-3MB70-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SCALANCE X208 (6GK5208-0BA10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XM416-4C (6GK5416-4GS00-2AM2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE X308-2M TS (6GK5308-2GG10-2CA2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X206-1 (6GK5206-1BB10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP1200 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3MB27-0BX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE M876-3 (6GK5876-3AA02-2BA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC HMI MTP1500 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3QB27-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions antérieures à 3.1.6 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP2200 Unified Comfort Hygienic neutral design (6AV2128-3XB70-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE SC626-2C (6GK5626-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC HMI MTP1900 Unified Comfort Panel neutral design (6AV2128-3UB36-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC HMI MTP700 Unified Comfort Panel hygienic neutral design (6AV2128-3GB40-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE X310 (6GK5310-0FA10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC HMI MTP700 Unified Comfort Panel hygienic neutral design (6AV2128-3GB70-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SJ00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP1900 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3UB27-1BX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SCALANCE X408-2 (6GK5408-2FD00-2AA2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIPROTEC 5 versions antérieures à 11.0 | ||
| Siemens | N/A | SCALANCE X308-2LD (6GK5308-2FM00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X310FE (6GK5310-0BA10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP1200 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3MB27-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC HMI MTP700, Unified Comfort Panel neutral design (6AV2128-3GB36-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC S7 PLCs Web Server toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE X308-2LD (6GK5308-2FM10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions antérieures à 8.3 | ||
| Siemens | N/A | SIMATIC HMI MTP1200 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3MB57-0BX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SJ00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SIMATIC ET 200SP HA IM155-6 PN versions antérieures à 1.3 | ||
| Siemens | N/A | SCALANCE SC642-2C (6GK5642-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X308-2 RD (inkl. SIPLUS variants) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X307-3LD (6GK5307-3BM10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP2200 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3XB27-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP2200 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3XB57-1BX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) versions antérieures à 10.2 | ||
| Siemens | N/A | SIMATIC HMI MTP1900 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3UB57-1BX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SK00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SCALANCE XF206-1 (6GK5206-1BC00-2AF2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DJ00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions antérieures à 3.1.6 | ||
| Siemens | N/A | SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE SC632-2C (6GK5632-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X307-3LD (6GK5307-3BM00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SK00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC HMI MTP2200 Unified Comfort Hygienic (6AV2128-3XB40-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC ET 200S IM 151-8 PN/DP CPU (6ES7151-8AB01-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE X320-1 FE (6GK5320-1BD00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X216 (6GK5216-0BA00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC CFU DIQ (6ES7655-5PX31-1XX0) versions antérieures à 2.0.0 | ||
| Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SIMATIC HMI MTP1200 Unified Comfort Panel (6AV2128-3MB06-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP1200 Unified Comfort Panel hygienic (6AV2128-3MB40-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE SC636-2C (6GK5636-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0) versions antérieures à 2.9.9 | ||
| Siemens | N/A | SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SIMATIC HMI MTP1000 Unified Comfort Panel hygienic (6AV2128-3KB40-0AX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC HMI MTP1200 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3MB27-1BX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE X206-1LD (6GK5206-1BC10-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE SC622-2C (6GK5622-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE XF208 (6GK5208-0BA00-2AF2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SIMATIC HMI MTP1200 Unified Comfort Panel neutral design (6AV2128-3MB36-0AX1) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SIMATIC HMI MTP1200 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3MB57-1BX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC HMI MTP1900 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3UB27-0BX0) versions antérieures à 21 | ||
| Siemens | N/A | SIMATIC HMI MTP1900 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3UB57-0BX0) versions antérieures à 21 | ||
| Siemens | N/A | SCALANCE XM408-8C (6GK5408-8GS00-2AM2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) versions antérieures à 3.2.0 | ||
| Siemens | N/A | SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) toutes versions pour les vulnérabilités CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789. | ||
| Siemens | N/A | SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE X204-2TS (6GK5204-2BB10-2CA2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) versions antérieures à 6.6.0 | ||
| Siemens | N/A | SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40833. | ||
| Siemens | N/A | SCALANCE M804PB (6GK5804-0AP00-2AA2) versions antérieures à 8.3 | ||
| Siemens | N/A | SCALANCE X204-2LD TS (6GK5204-2BC10-2CA2) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3) toutes versions pour la vulnérabilité CVE-2025-40833 | ||
| Siemens | N/A | SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions antérieures à 8.3 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V3 CPUs toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X208PRO (6GK5208-0HA10-2AA6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1000 Unified Comfort Panel (6AV2128-3KB06-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X224 (6GK5224-0BA00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP2200 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3XB27-0BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200S IM 151-8F PN/DP CPU (6ES7151-8FB01-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X310 (6GK5310-0FA00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V2 CPUs toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DK00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1500 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3QB57-0BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2 (6GK5308-2FL00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP2200 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3XB57-0BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP700 Unified Comfort Panel (6AV2128-3GB06-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC3 V4 CPUs toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1500 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3QB27-1BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1500 Unified Comfort Panel (6AV2128-3QB06-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CFU PA (6ES7655-5PX11-0XX0) versions ant\u00e9rieures \u00e0 2.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1500 Unified Comfort Panel neutral design (6AV2128-3QB36-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CFU PA (6ES7655-5PX11-1XX0) versions ant\u00e9rieures \u00e0 2.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1500 Unified Comfort Panel hygienic (6AV2128-3QB40-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X212-2 (6GK5212-2BB00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 versions sup\u00e9rieures ou \u00e9gales \u00e07.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-54017",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF204-2 (6GK5204-2BC00-2AF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X310FE (6GK5310-0BA00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1500 Unified Comfort Panel hygienic neutral design (6AV2128-3QB70-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1200 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3MB57-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200pro IM 154-8F PN/DP CPU (6ES7154-8FB01-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1000 Unified Comfort Panel hygienic neutral design (6AV2128-3KB70-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1900 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3UB27-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP2200 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3XB27-1BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7 PLCs Web Server versions ant\u00e9rieures \u00e0 2.9.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X204-2LD (6GK5204-2BC10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF204 (6GK5204-0BA00-2AF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M (6GK5308-2GG10-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1900 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3UB57-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 versions sup\u00e9rieures ou \u00e9gales \u00e07.80 et versions ant\u00e9rieures \u00e0 11.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-3 (6GK5307-3BL10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1900 Unified Comfort Panel (6AV2128-3UB06-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CN 4100 versions ant\u00e9rieures \u00e0 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1500 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3QB57-1BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUB852-1 (A1) (6GK5852-1EA10-1AA1) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M (6GK5308-2GG00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP2200 Unified Comfort Panel (6AV2128-3XB06-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUB852-1 (B1) (6GK5852-1EA10-1BA1) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X204-2 (6GK5204-2BB10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X212-2LD (6GK5212-2BC00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1500 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3QB27-0BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP2200 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3XB57-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP2200 Unified Comfort Panel neutral design (6AV2128-3XB36-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1900 Unified Comfort Panel hygienic (6AV2128-3UB40-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DJ00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1500 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3QB57-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200pro IM 154-8FX PN/DP CPU (6ES7154-8FX00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DK00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1000, Unified Comfort Panel neutral (6AV2128-3KB36-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1900 Unified Comfort Panel hygienic neutral design (6AV2128-3UB70-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7 PLCs Web Server versions ant\u00e9rieures \u00e0 3.1.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-3 (6GK5307-3BL00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0) versions ant\u00e9rieures \u00e0 2.9.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X204-2FM (6GK5204-2BB11-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7 PLCs Web Server toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200pro IM 154-8 PN/DP CPU (6ES7154-8AB01-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1200 Unified Comfort Panel hygienic neutral design (6AV2128-3MB70-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X208 (6GK5208-0BA10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X206-1 (6GK5206-1BB10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1200 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3MB27-0BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-3 (6GK5876-3AA02-2BA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1500 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3QB27-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions ant\u00e9rieures \u00e0 3.1.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP2200 Unified Comfort Hygienic neutral design (6AV2128-3XB70-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1900 Unified Comfort Panel neutral design (6AV2128-3UB36-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP700 Unified Comfort Panel hygienic neutral design (6AV2128-3GB40-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X310 (6GK5310-0FA10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP700 Unified Comfort Panel hygienic neutral design (6AV2128-3GB70-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SJ00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1900 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3UB27-1BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X408-2 (6GK5408-2FD00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPROTEC 5 versions ant\u00e9rieures \u00e0 11.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X310FE (6GK5310-0BA10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1200 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3MB27-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP700, Unified Comfort Panel neutral design (6AV2128-3GB36-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7 PLCs Web Server toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1200 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3MB57-0BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SJ00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP HA IM155-6 PN versions ant\u00e9rieures \u00e0 1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2 RD (inkl. SIPLUS variants) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP2200 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3XB27-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP2200 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3XB57-1BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 10.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1900 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3UB57-1BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SK00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF206-1 (6GK5206-1BC00-2AF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DJ00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions ant\u00e9rieures \u00e0 3.1.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SK00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP2200 Unified Comfort Hygienic (6AV2128-3XB40-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200S IM 151-8 PN/DP CPU (6ES7151-8AB01-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X216 (6GK5216-0BA00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CFU DIQ (6ES7655-5PX31-1XX0) versions ant\u00e9rieures \u00e0 2.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1200 Unified Comfort Panel (6AV2128-3MB06-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1200 Unified Comfort Panel hygienic (6AV2128-3MB40-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0) versions ant\u00e9rieures \u00e0 2.9.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1000 Unified Comfort Panel hygienic (6AV2128-3KB40-0AX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1200 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3MB27-1BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X206-1LD (6GK5206-1BC10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XF208 (6GK5208-0BA00-2AF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1200 Unified Comfort Panel neutral design (6AV2128-3MB36-0AX1) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1200 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3MB57-1BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1900 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3UB27-0BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI MTP1900 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3UB57-0BX0) versions ant\u00e9rieures \u00e0 21",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) versions ant\u00e9rieures \u00e0 3.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X204-2TS (6GK5204-2BB10-2CA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X204-2LD TS (6GK5204-2BC10-2CA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2025-39812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39812"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-39808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39808"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2025-39828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39828"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-40833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40833"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2026-25787",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25787"
},
{
"name": "CVE-2026-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22925"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-39866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39866"
},
{
"name": "CVE-2025-39843",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39843"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-39853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39853"
},
{
"name": "CVE-2025-39857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39857"
},
{
"name": "CVE-2025-39865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39865"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-38502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38502"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-39823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39823"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-39864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39864"
},
{
"name": "CVE-2025-39824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39824"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39842"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-39849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39849"
},
{
"name": "CVE-2026-28389",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28389"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-39845",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39845"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-43368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43368"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2026-28387",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28387"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2026-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28388"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-39697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39697"
},
{
"name": "CVE-2026-25786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25786"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-39860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39860"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-39839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39839"
},
{
"name": "CVE-2025-38723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38723"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-39848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39848"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2026-28390",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28390"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2025-39806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39806"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2026-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22924"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-39846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39846"
},
{
"name": "CVE-2026-31789",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31789"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-39844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39844"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2024-58240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58240"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2024-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54017"
},
{
"name": "CVE-2025-39817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39817"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2026-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2673"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2026-27662",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27662"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2026-25789",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25789"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-31257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31257"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38736"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-39682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39682"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-39847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39847"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-39835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39835"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-39841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39841"
},
{
"name": "CVE-2026-31790",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31790"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-05-12T00:00:00",
"last_revision_date": "2026-05-12T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0565",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-05-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-392349",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-392349.html"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-032379",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-032379.html"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-786884",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-786884.html"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-688146",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-688146.html"
},
{
"published_at": "2026-05-12",
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-387223",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-387223.html"
}
]
}
CERTFR-2026-AVI-0199
Vulnerability from certfr_avis - Published: 2026-02-24 - Updated: 2026-02-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Telco Cloud Platform | Telco Cloud Platform versions 4.x et 5.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Data Services | Tanzu Data Flow versions antérieures à 2.0.2 sur Tanzu Platform | ||
| VMware | Azure Spring Enterprise | Harbor Registry versions antérieures à 2.14.2 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour MySQL versions 2.0.0 sur Kubernetes | ||
| VMware | Cloud Foundation | Cloud Foundation versions 9.x antérieures à 9.0.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à2.3.3 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire versions antérieures à 2.6.1 sur Kubernetes | ||
| VMware | Tanzu Kubernetes Runtime | CredHub Secrets Management pour Tanzu Platform versions antérieures à 1.6.8 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 3.3.1 sur Kubernetes | ||
| VMware | Tanzu Operations Manager | Foundation Core pour Tanzu Platform versions antérieures à 3.2.4 | ||
| VMware | Aria Operations | Aria Operations versions 8.x antérieures à 8.18.6 | ||
| VMware | Tanzu Kubernetes Runtime | cf-mgmt pour Tanzu Platform versions antérieures à 1.0.108 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Valkey version 9.0.1 | ||
| VMware | Tanzu Kubernetes Runtime | Extended App Support pour Tanzu Platform versions antérieures à 1.0.15 | ||
| VMware | Tanzu Data Intelligence | Tanzu GemFire Management versions antérieures à 1.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.77 | ||
| VMware | Tanzu Kubernetes Runtime | Cloud Native Buildpacks pour Tanzu Platform versions antérieures à 0.6.5 | ||
| VMware | Cloud Foundation | Cloud Foundation versions 4.x et 5.x sans le correctif de sécurité KB92148 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour Tanzu Platform versions antérieures à 10.3.4 | ||
| VMware | Tanzu Kubernetes Runtime | Java Buildpack versions antérieures à 4.89.0 | ||
| VMware | Telco Cloud Infrastructure | Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB428241 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Telco Cloud Platform versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow versions ant\u00e9rieures \u00e0 2.0.2 sur Tanzu Platform",
"product": {
"name": "Tanzu Data Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Harbor Registry versions ant\u00e9rieures \u00e0 2.14.2",
"product": {
"name": "Azure Spring Enterprise",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour MySQL versions 2.0.0 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 9.x ant\u00e9rieures \u00e0 9.0.2.0",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Metrics versions ant\u00e9rieures \u00e02.3.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 2.6.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Secrets Management pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.6.8",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 3.3.1 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.4",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Aria Operations versions 8.x ant\u00e9rieures \u00e0 8.18.6",
"product": {
"name": "Aria Operations",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "cf-mgmt pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.108",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey version 9.0.1",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Extended App Support pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.0.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Management versions ant\u00e9rieures \u00e0 1.4.3",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.77",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Native Buildpacks pour Tanzu Platform versions ant\u00e9rieures \u00e0 0.6.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Cloud Foundation versions 4.x et 5.x sans le correctif de s\u00e9curit\u00e9 KB92148",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.89.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9 KB428241",
"product": {
"name": "Telco Cloud Infrastructure",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2017-16544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16544"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2022-24450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24450"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2020-10750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10750"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2020-8169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
},
{
"name": "CVE-2021-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41091"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2018-1000517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000517"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2021-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43816"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10543"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2019-5481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
},
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-29222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29222"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2024-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47561"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-29190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29190"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2018-20679",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20679"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2017-15873",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15873"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-22719",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22719"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2022-39399",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39399"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2023-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22041"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2023-47090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47090"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2022-29946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29946"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38561"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-30215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30215"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-22036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22036"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2022-26652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26652"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2017-15874",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15874"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2026-22721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22721"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2023-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21835"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2021-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41089"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2019-5747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5747"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2018-1000500",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2026-26014",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26014"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2024-27289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27289"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2021-42836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42836"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2026-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21941"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2019-5482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2019-5443",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2020-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2023-22006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22006"
},
{
"name": "CVE-2019-5435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2021-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43565"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-23648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23648"
},
{
"name": "CVE-2021-23841",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23841"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2026-22720",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22720"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29189"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-24T00:00:00",
"last_revision_date": "2026-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0199",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37012",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37012"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37001",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37001"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37013",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37013"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37003",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37003"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37023",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37023"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37017",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37017"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37006",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37006"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37024",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37024"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36997",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36997"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37004",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37004"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36947",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37018",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37018"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37005",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37005"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37008",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37008"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37007",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37007"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37020",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37020"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36998",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36998"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37002",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37002"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37021",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37021"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37022",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37022"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37016",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37016"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37019",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37019"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37010",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37010"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37009",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37009"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37000",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37000"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37011",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37011"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37015",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37015"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37014",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37014"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36999",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36999"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2026-AVI-0069
Vulnerability from certfr_avis - Published: 2026-01-21 - Updated: 2026-01-21
De multiples vulnérabilités ont été découvertes dans Oracle Java SE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Java SE | Oracle Java SE versions 11.0.29, 17.0.17, 21.0.9 et 25.0.1 | ||
| Oracle | Java SE | Oracle JDK Mission Control version 9.1.1 | ||
| Oracle | Java SE | Oracle Java SE versions 8u471, 8u471-b50 et 8u471-perf | ||
| Oracle | Java SE | Oracle GraalVM Enterprise Edition version 21.3.16 | ||
| Oracle | Java SE | Oracle GraalVM pour JDK versions 17.0.17 et 21.0.9 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Java SE versions 11.0.29, 17.0.17, 21.0.9 et 25.0.1",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JDK Mission Control version 9.1.1",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Java SE versions 8u471, 8u471-b50 et 8u471-perf",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle GraalVM Enterprise Edition version 21.3.16",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle GraalVM pour JDK versions 17.0.17 et 21.0.9",
"product": {
"name": "Java SE",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47219"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-43368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43368"
},
{
"name": "CVE-2025-43356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43356"
},
{
"name": "CVE-2025-43272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43272"
},
{
"name": "CVE-2025-47183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47183"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2025-43342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43342"
},
{
"name": "CVE-2026-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21947"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-12183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12183"
}
],
"initial_release_date": "2026-01-21T00:00:00",
"last_revision_date": "2026-01-21T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0069",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Java SE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java SE",
"vendor_advisories": [
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Java SE cpujan2026",
"url": "https://www.oracle.com/security-alerts/cpujan2026.html"
}
]
}
MSRC_CVE-2025-6052
Vulnerability from csaf_microsoft - Published: 2025-06-02 00:00 - Updated: 2026-02-18 14:51| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2025/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2025/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6052 Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-6052.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring",
"tracking": {
"current_release_date": "2026-02-18T14:51:28.000Z",
"generator": {
"date": "2026-02-21T04:08:22.922Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-6052",
"initial_release_date": "2025-06-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-09-04T00:13:38.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-02-18T14:51:28.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 glib 2.78.6-3",
"product": {
"name": "\u003cazl3 glib 2.78.6-3",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 glib 2.78.6-3",
"product": {
"name": "azl3 glib 2.78.6-3",
"product_id": "20272"
}
}
],
"category": "product_name",
"name": "glib"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 glib 2.78.6-3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 glib 2.78.6-3 as a component of Azure Linux 3.0",
"product_id": "20272-17084"
},
"product_reference": "20272",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6052",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20272-17084"
],
"known_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6052 Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-6052.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-04T00:13:38.000Z",
"details": "2.78.6-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 3.7,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"17084-1"
]
}
],
"title": "Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring"
}
]
}
SSA-032379
Vulnerability from csaf_siemens - Published: 2026-05-12 00:00 - Updated: 2026-05-12 00:00{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SIMATIC CN 4100 contains multiple vulnerabilities which could potentially lead to a compromise in availability, integrity and confidentiality.\n\nSiemens has released a new version for SIMATIC CN 4100 and recommends to update to the latest version.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-032379: Multiple Vulnerabilities in SIMATIC CN 4100 Before V5.0 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-032379.html"
},
{
"category": "self",
"summary": "SSA-032379: Multiple Vulnerabilities in SIMATIC CN 4100 Before V5.0 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-032379.json"
}
],
"title": "SSA-032379: Multiple Vulnerabilities in SIMATIC CN 4100 Before V5.0",
"tracking": {
"current_release_date": "2026-05-12T00:00:00.000Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-032379",
"initial_release_date": "2026-05-12T00:00:00.000Z",
"revision_history": [
{
"date": "2026-05-12T00:00:00.000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
}
],
"status": "interim",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.0",
"product": {
"name": "SIMATIC CN 4100",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SIMATIC CN 4100"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47704",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Check link_res-\u003ehpo_dp_link_enc before using it\r\n\r\n[WHAT \u0026 HOW]\r\nFunctions dp_enable_link_phy and dp_disable_link_phy can pass link_res\r\nwithout initializing hpo_dp_link_enc and it is necessary to check for\r\nnull before dereferencing.\r\n\r\nThis fixes 2 FORWARD_NULL issues reported by Coverity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-47704"
},
{
"cve": "CVE-2024-57924",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: relax assertions on failure to encode file handles\n\nEncoding file handles is usually performed by a filesystem \u003eencode_fh()\nmethod that may fail for various reasons.\n\nThe legacy users of exportfs_encode_fh(), namely, nfsd and\nname_to_handle_at(2) syscall are ready to cope with the possibility\nof failure to encode a file handle.\n\nThere are a few other users of exportfs_encode_{fh,fid}() that\ncurrently have a WARN_ON() assertion when -\u003eencode_fh() fails.\nRelax those assertions because they are wrong.\n\nThe second linked bug report states commit 16aac5ad1fa9 (\"ovl: support\nencoding non-decodable file handles\") in v6.6 as the regressing commit,\nbut this is not accurate.\n\nThe aforementioned commit only increases the chances of the assertion\nand allows triggering the assertion with the reproducer using overlayfs,\ninotify and drop_caches.\n\nTriggering this assertion was always possible with other filesystems and\nother reasons of -\u003eencode_fh() failures and more particularly, it was\nalso possible with the exact same reproducer using overlayfs that is\nmounted with options index=on,nfs_export=on also on kernels \u003c v6.6.\nTherefore, I am not listing the aforementioned commit as a Fixes commit.\n\nBackport hint: this patch will have a trivial conflict applying to\nv6.6.y, and other trivial conflicts applying to stable kernels \u003c v6.6.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-57924"
},
{
"cve": "CVE-2024-58240",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntls: separate no-async decryption request handling from async\r\n\r\nIf we\u0027re not doing async, the handling is much simpler. There\u0027s no\r\nreference counting, we just need to wait for the completion to wake us\r\nup and return its result.\r\n\r\nWe should preferably also use a separate crypto_wait. I\u0027m not seeing a\r\nUAF as I did in the past, I think aec7961916f3 (\"tls: fix race between\r\nasync notify and socket close\") took care of it.\r\n\r\nThis will make the next fix easier.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-58240"
},
{
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-6021"
},
{
"cve": "CVE-2025-6052",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in how GLib\u2019s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u2019t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-6052"
},
{
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-7425"
},
{
"cve": "CVE-2025-8916",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. BC Java bcpkix on All (API modules), Legion of the Bouncy Castle Inc. BC Java bcprov on All (API modules), Legion of the Bouncy Castle Inc. BCPKIX FIPS bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/pkix/src/main/java/org/bouncycastle/pkix/jcajce/PKIXCertPathReviewer.Java, https://github.Com/bcgit/bc-java/blob/main/prov/src/main/java/org/bouncycastle/x509/PKIXCertPathReviewer.Java.\r\n\r\nThis issue affects BC Java: from 1.44 through 1.78; BC Java: from 1.44 through 1.78; BCPKIX FIPS: from 1.0.0 through 1.0.7, from 2.0.0 through 2.0.7.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-8916"
},
{
"cve": "CVE-2025-9230",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: An application trying to decrypt CMS messages encrypted using\npassword based encryption can trigger an out-of-bounds read and write.\n\nImpact summary: This out-of-bounds read may trigger a crash which leads to\nDenial of Service for an application. The out-of-bounds write can cause\na memory corruption which can have various consequences including\na Denial of Service or Execution of attacker-supplied code.\n\nAlthough the consequences of a successful exploit of this vulnerability\ncould be severe, the probability that the attacker would be able to\nperform it is low. Besides, password based (PWRI) encryption support in CMS\nmessages is very rarely used. For that reason the issue was assessed as\nModerate severity according to our Security Policy.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-9230"
},
{
"cve": "CVE-2025-9231",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: A timing side-channel which could potentially allow remote\nrecovery of the private key exists in the SM2 algorithm implementation on 64 bit\nARM platforms.\n\nImpact summary: A timing side-channel in SM2 signature computations on 64 bit\nARM platforms could allow recovering the private key by an attacker..\n\nWhile remote key recovery over a network was not attempted by the reporter,\ntiming measurements revealed a timing signal which may allow such an attack.\n\nOpenSSL does not directly support certificates with SM2 keys in TLS, and so\nthis CVE is not relevant in most TLS contexts. However, given that it is\npossible to add support for such certificates via a custom provider, coupled\nwith the fact that in such a custom provider context the private key may be\nrecoverable via remote timing measurements, we consider this to be a Moderate\nseverity issue.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as SM2 is not an approved algorithm.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-9231"
},
{
"cve": "CVE-2025-9232",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: An application using the OpenSSL HTTP client API functions may\ntrigger an out-of-bounds read if the \u0027no_proxy\u0027 environment variable is set and\nthe host portion of the authority component of the HTTP URL is an IPv6 address.\n\nImpact summary: An out-of-bounds read can trigger a crash which leads to\nDenial of Service for an application.\n\nThe OpenSSL HTTP client API functions can be used directly by applications\nbut they are also used by the OCSP client functions and CMP (Certificate\nManagement Protocol) client implementation in OpenSSL. However the URLs used\nby these implementations are unlikely to be controlled by an attacker.\n\nIn this vulnerable code the out of bounds read can only trigger a crash.\nFurthermore the vulnerability requires an attacker-controlled URL to be\npassed from an application to the OpenSSL function and the user has to have\na \u0027no_proxy\u0027 environment variable set. For the aforementioned reasons the\nissue was assessed as Low severity.\n\nThe vulnerable code was introduced in the following patch releases:\n3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the HTTP client implementation is outside the OpenSSL FIPS module\nboundary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-9232"
},
{
"cve": "CVE-2025-9820",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-9820"
},
{
"cve": "CVE-2025-14831",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-14831"
},
{
"cve": "CVE-2025-23143",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: Fix null-ptr-deref by sock_lock_init_class_and_name() and rmmod.\r\n\r\nWhen I ran the repro [0] and waited a few seconds, I observed two\r\nLOCKDEP splats: a warning immediately followed by a null-ptr-deref. [1]\r\n\r\nReproduction Steps:\r\n\r\n 1) Mount CIFS\r\n 2) Add an iptables rule to drop incoming FIN packets for CIFS\r\n 3) Unmount CIFS\r\n 4) Unload the CIFS module\r\n 5) Remove the iptables rule\r\n\r\nAt step 3), the CIFS module calls sock_release() for the underlying\r\nTCP socket, and it returns quickly. However, the socket remains in\r\nFIN_WAIT_1 because incoming FIN packets are dropped.\r\n\r\nAt this point, the module\u0027s refcnt is 0 while the socket is still\r\nalive, so the following rmmod command succeeds.\r\n\r\n # ss -tan\r\n State Recv-Q Send-Q Local Address:Port Peer Address:Port\r\n FIN-WAIT-1 0 477 10.0.2.15:51062 10.0.0.137:445\r\n\r\n # lsmod | grep cifs\r\n cifs 1159168 0\r\n\r\nThis highlights a discrepancy between the lifetime of the CIFS module\r\nand the underlying TCP socket. Even after CIFS calls sock_release()\r\nand it returns, the TCP socket does not die immediately in order to\r\nclose the connection gracefully.\r\n\r\nWhile this is generally fine, it causes an issue with LOCKDEP because\r\nCIFS assigns a different lock class to the TCP socket\u0027s sk-\u003esk_lock\r\nusing sock_lock_init_class_and_name().\r\n\r\nOnce an incoming packet is processed for the socket or a timer fires,\r\nsk-\u003esk_lock is acquired.\r\n\r\nThen, LOCKDEP checks the lock context in check_wait_context(), where\r\nhlock_class() is called to retrieve the lock class. However, since\r\nthe module has already been unloaded, hlock_class() logs a warning\r\nand returns NULL, triggering the null-ptr-deref.\r\n\r\nIf LOCKDEP is enabled, we must ensure that a module calling\r\nsock_lock_init_class_and_name() (CIFS, NFS, etc) cannot be unloaded\r\nwhile such a socket is still alive to prevent this issue.\r\n\r\nLet\u0027s hold the module reference in sock_lock_init_class_and_name()\r\nand release it when the socket is freed in sk_prot_free().\r\n\r\nNote that sock_lock_init() clears sk-\u003esk_owner for svc_create_socket()\r\nthat calls sock_lock_init_class_and_name() for a listening socket,\r\nwhich clones a socket by sk_clone_lock() without GFP_ZERO.\r\n\r\n[0]:\r\nCIFS_SERVER=\"10.0.0.137\"\r\nCIFS_PATH=\"//${CIFS_SERVER}/Users/Administrator/Desktop/CIFS_TEST\"\r\nDEV=\"enp0s3\"\r\nCRED=\"/root/WindowsCredential.txt\"\r\n\r\nMNT=$(mktemp -d /tmp/XXXXXX)\r\nmount -t cifs ${CIFS_PATH} ${MNT} -o vers=3.0,credentials=${CRED},cache=none,echo_interval=1\r\n\r\niptables -A INPUT -s ${CIFS_SERVER} -j DROP\r\n\r\nfor i in $(seq 10);\r\ndo\r\n umount ${MNT}\r\n rmmod cifs\r\n sleep 1\r\ndone\r\n\r\nrm -r ${MNT}\r\n\r\niptables -D INPUT -s ${CIFS_SERVER} -j DROP\r\n\r\n[1]:\r\nDEBUG_LOCKS_WARN_ON(1)\r\nWARNING: CPU: 10 PID: 0 at kernel/locking/lockdep.c:234 hlock_class (kernel/locking/lockdep.c:234 kernel/locking/lockdep.c:223)\r\nModules linked in: cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs]\r\nCPU: 10 UID: 0 PID: 0 Comm: swapper/10 Not tainted 6.14.0 #36\r\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\r\nRIP: 0010:hlock_class (kernel/locking/lockdep.c:234 kernel/locking/lockdep.c:223)\r\n...\r\nCall Trace:\r\n \u003cIRQ\u003e\r\n __lock_acquire (kernel/locking/lockdep.c:4853 kernel/locking/lockdep.c:5178)\r\n lock_acquire (kernel/locking/lockdep.c:469 kernel/locking/lockdep.c:5853 kernel/locking/lockdep.c:5816)\r\n _raw_spin_lock_nested (kernel/locking/spinlock.c:379)\r\n tcp_v4_rcv (./include/linux/skbuff.h:1678 ./include/net/tcp.h:2547 net/ipv4/tcp_ipv4.c:2350)\r\n...\r\n\r\nBUG: kernel NULL pointer dereference, address: 00000000000000c4\r\n PF: supervisor read access in kernel mode\r\n PF: error_code(0x0000) - not-present page\r\nPGD 0\r\nOops: Oops: 0000 [#1] PREEMPT SMP NOPTI\r\nCPU: 10 UID: 0 PID: 0 Comm: swapper/10 Tainted: G W 6.14.0 #36\r\nTainted: [W]=WARN\r\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\r\nRIP: 0010:__lock_acquire (kernel/\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-23143"
},
{
"cve": "CVE-2025-23160",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: mediatek: vcodec: Fix a resource leak related to the scp device in FW initialization\r\n\r\nOn Mediatek devices with a system companion processor (SCP) the mtk_scp\r\nstructure has to be removed explicitly to avoid a resource leak.\r\nFree the structure in case the allocation of the firmware structure fails\r\nduring the firmware initialization.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-23160"
},
{
"cve": "CVE-2025-31257",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "This issue was addressed with improved memory handling. This issue is fixed in Safari 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, tvOS 18.5, visionOS 2.5, watchOS 11.5. Processing maliciously crafted web content may lead to an unexpected Safari crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-31257"
},
{
"cve": "CVE-2025-37931",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbtrfs: adjust subpage bit start based on sectorsize\r\n\r\nWhen running machines with 64k page size and a 16k nodesize we started\r\nseeing tree log corruption in production. This turned out to be because\r\nwe were not writing out dirty blocks sometimes, so this in fact affects\r\nall metadata writes.\r\n\r\nWhen writing out a subpage EB we scan the subpage bitmap for a dirty\r\nrange. If the range isn\u0027t dirty we do\r\n\r\n\tbit_start++;\r\n\r\nto move onto the next bit. The problem is the bitmap is based on the\r\nnumber of sectors that an EB has. So in this case, we have a 64k\r\npagesize, 16k nodesize, but a 4k sectorsize. This means our bitmap is 4\r\nbits for every node. With a 64k page size we end up with 4 nodes per\r\npage.\r\n\r\nTo make this easier this is how everything looks\r\n\r\n[0 16k 32k 48k ] logical address\r\n[0 4 8 12 ] radix tree offset\r\n[ 64k page ] folio\r\n[ 16k eb ][ 16k eb ][ 16k eb ][ 16k eb ] extent buffers\r\n[ | | | | | | | | | | | | | | | | ] bitmap\r\n\r\nNow we use all of our addressing based on fs_info-\u003esectorsize_bits, so\r\nas you can see the above our 16k eb-\u003estart turns into radix entry 4.\r\n\r\nWhen we find a dirty range for our eb, we correctly do bit_start +=\r\nsectors_per_node, because if we start at bit 0, the next bit for the\r\nnext eb is 4, to correspond to eb-\u003estart 16k.\r\n\r\nHowever if our range is clean, we will do bit_start++, which will now\r\nput us offset from our radix tree entries.\r\n\r\nIn our case, assume that the first time we check the bitmap the block is\r\nnot dirty, we increment bit_start so now it == 1, and then we loop\r\naround and check again. This time it is dirty, and we go to find that\r\nstart using the following equation\r\n\r\n\tstart = folio_start + bit_start * fs_info-\u003esectorsize;\r\n\r\nso in the case above, eb-\u003estart 0 is now dirty, and we calculate start\r\nas\r\n\r\n\t0 + 1 * fs_info-\u003esectorsize = 4096\r\n\t4096 \u003e\u003e 12 = 1\r\n\r\nNow we\u0027re looking up the radix tree for 1, and we won\u0027t find an eb.\r\nWhat\u0027s worse is now we\u0027re using bit_start == 1, so we do bit_start +=\r\nsectors_per_node, which is now 5. If that eb is dirty we will run into\r\nthe same thing, we will look at an offset that is not populated in the\r\nradix tree, and now we\u0027re skipping the writeout of dirty extent buffers.\r\n\r\nThe best fix for this is to not use sectorsize_bits to address nodes,\r\nbut that\u0027s a larger change. Since this is a fs corruption problem fix\r\nit simply by always using sectors_per_node to increment the start bit.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-37931"
},
{
"cve": "CVE-2025-37968",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\niio: light: opt3001: fix deadlock due to concurrent flag access\r\n\r\nThe threaded IRQ function in this driver is reading the flag twice: once to\r\nlock a mutex and once to unlock it. Even though the code setting the flag\r\nis designed to prevent it, there are subtle cases where the flag could be\r\ntrue at the mutex_lock stage and false at the mutex_unlock stage. This\r\nresults in the mutex not being unlocked, resulting in a deadlock.\r\n\r\nFix it by making the opt3001_irq() code generally more robust, reading the\r\nflag into a variable and using the variable value at both stages.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-37968"
},
{
"cve": "CVE-2025-38322",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nperf/x86/intel: Fix crash in icl_update_topdown_event()\r\n\r\nThe perf_fuzzer found a hard-lockup crash on a RaptorLake machine:\r\n\r\n Oops: general protection fault, maybe for address 0xffff89aeceab400: 0000\r\n CPU: 23 UID: 0 PID: 0 Comm: swapper/23\r\n Tainted: [W]=WARN\r\n Hardware name: Dell Inc. Precision 9660/0VJ762\r\n RIP: 0010:native_read_pmc+0x7/0x40\r\n Code: cc e8 8d a9 01 00 48 89 03 5b cd cc cc cc cc 0f 1f ...\r\n RSP: 000:fffb03100273de8 EFLAGS: 00010046\r\n ....\r\n Call Trace:\r\n \u003cTASK\u003e\r\n icl_update_topdown_event+0x165/0x190\r\n ? ktime_get+0x38/0xd0\r\n intel_pmu_read_event+0xf9/0x210\r\n __perf_event_read+0xf9/0x210\r\n\r\nCPUs 16-23 are E-core CPUs that don\u0027t support the perf metrics feature.\r\nThe icl_update_topdown_event() should not be invoked on these CPUs.\r\n\r\nIt\u0027s a regression of commit:\r\n\r\n f9bdf1f95339 (\"perf/x86/intel: Avoid disable PMU if !cpuc-\u003eenabled in sample read\")\r\n\r\nThe bug introduced by that commit is that the is_topdown_event() function\r\nis mistakenly used to replace the is_topdown_count() call to check if the\r\ntopdown functions for the perf metrics feature should be invoked.\r\n\r\nFix it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38322"
},
{
"cve": "CVE-2025-38347",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nf2fs: fix to do sanity check on ino and xnid\r\n\r\nsyzbot reported a f2fs bug as below:\r\n\r\nINFO: task syz-executor140:5308 blocked for more than 143 seconds.\r\n Not tainted 6.14.0-rc7-syzkaller-00069-g81e4f8d68c66 #0\r\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\r\ntask:syz-executor140 state:D stack:24016 pid:5308 tgid:5308 ppid:5306 task_flags:0x400140 flags:0x00000006\r\nCall Trace:\r\n \u003cTASK\u003e\r\n context_switch kernel/sched/core.c:5378 [inline]\r\n __schedule+0x190e/0x4c90 kernel/sched/core.c:6765\r\n __schedule_loop kernel/sched/core.c:6842 [inline]\r\n schedule+0x14b/0x320 kernel/sched/core.c:6857\r\n io_schedule+0x8d/0x110 kernel/sched/core.c:7690\r\n folio_wait_bit_common+0x839/0xee0 mm/filemap.c:1317\r\n __folio_lock mm/filemap.c:1664 [inline]\r\n folio_lock include/linux/pagemap.h:1163 [inline]\r\n __filemap_get_folio+0x147/0xb40 mm/filemap.c:1917\r\n pagecache_get_page+0x2c/0x130 mm/folio-compat.c:87\r\n find_get_page_flags include/linux/pagemap.h:842 [inline]\r\n f2fs_grab_cache_page+0x2b/0x320 fs/f2fs/f2fs.h:2776\r\n __get_node_page+0x131/0x11b0 fs/f2fs/node.c:1463\r\n read_xattr_block+0xfb/0x190 fs/f2fs/xattr.c:306\r\n lookup_all_xattrs fs/f2fs/xattr.c:355 [inline]\r\n f2fs_getxattr+0x676/0xf70 fs/f2fs/xattr.c:533\r\n __f2fs_get_acl+0x52/0x870 fs/f2fs/acl.c:179\r\n f2fs_acl_create fs/f2fs/acl.c:375 [inline]\r\n f2fs_init_acl+0xd7/0x9b0 fs/f2fs/acl.c:418\r\n f2fs_init_inode_metadata+0xa0f/0x1050 fs/f2fs/dir.c:539\r\n f2fs_add_inline_entry+0x448/0x860 fs/f2fs/inline.c:666\r\n f2fs_add_dentry+0xba/0x1e0 fs/f2fs/dir.c:765\r\n f2fs_do_add_link+0x28c/0x3a0 fs/f2fs/dir.c:808\r\n f2fs_add_link fs/f2fs/f2fs.h:3616 [inline]\r\n f2fs_mknod+0x2e8/0x5b0 fs/f2fs/namei.c:766\r\n vfs_mknod+0x36d/0x3b0 fs/namei.c:4191\r\n unix_bind_bsd net/unix/af_unix.c:1286 [inline]\r\n unix_bind+0x563/0xe30 net/unix/af_unix.c:1379\r\n __sys_bind_socket net/socket.c:1817 [inline]\r\n __sys_bind+0x1e4/0x290 net/socket.c:1848\r\n __do_sys_bind net/socket.c:1853 [inline]\r\n __se_sys_bind net/socket.c:1851 [inline]\r\n __x64_sys_bind+0x7a/0x90 net/socket.c:1851\r\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\r\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nLet\u0027s dump and check metadata of corrupted inode, it shows its xattr_nid\r\nis the same to its i_ino.\r\n\r\ndump.f2fs -i 3 chaseyu.img.raw\r\ni_xattr_nid [0x 3 : 3]\r\n\r\nSo that, during mknod in the corrupted directory, it tries to get and\r\nlock inode page twice, result in deadlock.\r\n\r\n- f2fs_mknod\r\n - f2fs_add_inline_entry\r\n - f2fs_get_inode_page --- lock dir\u0027s inode page\r\n - f2fs_init_acl\r\n - f2fs_acl_create(dir,..)\r\n - __f2fs_get_acl\r\n - f2fs_getxattr\r\n - lookup_all_xattrs\r\n - __get_node_page --- try to lock dir\u0027s inode page\r\n\r\nIn order to fix this, let\u0027s add sanity check on ino and xnid.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38347"
},
{
"cve": "CVE-2025-38491",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmptcp: make fallback action and fallback decision atomic\r\n\r\nSyzkaller reported the following splat:\r\n\r\n WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 __mptcp_do_fallback net/mptcp/protocol.h:1223 [inline]\r\n WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 mptcp_do_fallback net/mptcp/protocol.h:1244 [inline]\r\n WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 check_fully_established net/mptcp/options.c:982 [inline]\r\n WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 mptcp_incoming_options+0x21a8/0x2510 net/mptcp/options.c:1153\r\n Modules linked in:\r\n CPU: 1 UID: 0 PID: 7704 Comm: syz.3.1419 Not tainted 6.16.0-rc3-gbd5ce2324dba #20 PREEMPT(voluntary)\r\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\r\n RIP: 0010:__mptcp_do_fallback net/mptcp/protocol.h:1223 [inline]\r\n RIP: 0010:mptcp_do_fallback net/mptcp/protocol.h:1244 [inline]\r\n RIP: 0010:check_fully_established net/mptcp/options.c:982 [inline]\r\n RIP: 0010:mptcp_incoming_options+0x21a8/0x2510 net/mptcp/options.c:1153\r\n Code: 24 18 e8 bb 2a 00 fd e9 1b df ff ff e8 b1 21 0f 00 e8 ec 5f c4 fc 44 0f b7 ac 24 b0 00 00 00 e9 54 f1 ff ff e8 d9 5f c4 fc 90 \u003c0f\u003e 0b 90 e9 b8 f4 ff ff e8 8b 2a 00 fd e9 8d e6 ff ff e8 81 2a 00\r\n RSP: 0018:ffff8880a3f08448 EFLAGS: 00010246\r\n RAX: 0000000000000000 RBX: ffff8880180a8000 RCX: ffffffff84afcf45\r\n RDX: ffff888090223700 RSI: ffffffff84afdaa7 RDI: 0000000000000001\r\n RBP: ffff888017955780 R08: 0000000000000001 R09: 0000000000000000\r\n R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000\r\n R13: ffff8880180a8910 R14: ffff8880a3e9d058 R15: 0000000000000000\r\n FS: 00005555791b8500(0000) GS:ffff88811c495000(0000) knlGS:0000000000000000\r\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\r\n CR2: 000000110c2800b7 CR3: 0000000058e44000 CR4: 0000000000350ef0\r\n Call Trace:\r\n \u003cIRQ\u003e\r\n tcp_reset+0x26f/0x2b0 net/ipv4/tcp_input.c:4432\r\n tcp_validate_incoming+0x1057/0x1b60 net/ipv4/tcp_input.c:5975\r\n tcp_rcv_established+0x5b5/0x21f0 net/ipv4/tcp_input.c:6166\r\n tcp_v4_do_rcv+0x5dc/0xa70 net/ipv4/tcp_ipv4.c:1925\r\n tcp_v4_rcv+0x3473/0x44a0 net/ipv4/tcp_ipv4.c:2363\r\n ip_protocol_deliver_rcu+0xba/0x480 net/ipv4/ip_input.c:205\r\n ip_local_deliver_finish+0x2f1/0x500 net/ipv4/ip_input.c:233\r\n NF_HOOK include/linux/netfilter.h:317 [inline]\r\n NF_HOOK include/linux/netfilter.h:311 [inline]\r\n ip_local_deliver+0x1be/0x560 net/ipv4/ip_input.c:254\r\n dst_input include/net/dst.h:469 [inline]\r\n ip_rcv_finish net/ipv4/ip_input.c:447 [inline]\r\n NF_HOOK include/linux/netfilter.h:317 [inline]\r\n NF_HOOK include/linux/netfilter.h:311 [inline]\r\n ip_rcv+0x514/0x810 net/ipv4/ip_input.c:567\r\n __netif_receive_skb_one_core+0x197/0x1e0 net/core/dev.c:5975\r\n __netif_receive_skb+0x1f/0x120 net/core/dev.c:6088\r\n process_backlog+0x301/0x1360 net/core/dev.c:6440\r\n __napi_poll.constprop.0+0xba/0x550 net/core/dev.c:7453\r\n napi_poll net/core/dev.c:7517 [inline]\r\n net_rx_action+0xb44/0x1010 net/core/dev.c:7644\r\n handle_softirqs+0x1d0/0x770 kernel/softirq.c:579\r\n do_softirq+0x3f/0x90 kernel/softirq.c:480\r\n \u003c/IRQ\u003e\r\n \u003cTASK\u003e\r\n __local_bh_enable_ip+0xed/0x110 kernel/softirq.c:407\r\n local_bh_enable include/linux/bottom_half.h:33 [inline]\r\n inet_csk_listen_stop+0x2c5/0x1070 net/ipv4/inet_connection_sock.c:1524\r\n mptcp_check_listen_stop.part.0+0x1cc/0x220 net/mptcp/protocol.c:2985\r\n mptcp_check_listen_stop net/mptcp/mib.h:118 [inline]\r\n __mptcp_close+0x9b9/0xbd0 net/mptcp/protocol.c:3000\r\n mptcp_close+0x2f/0x140 net/mptcp/protocol.c:3066\r\n inet_release+0xed/0x200 net/ipv4/af_inet.c:435\r\n inet6_release+0x4f/0x70 net/ipv6/af_inet6.c:487\r\n __sock_release+0xb3/0x270 net/socket.c:649\r\n sock_close+0x1c/0x30 net/socket.c:1439\r\n __fput+0x402/0xb70 fs/file_table.c:465\r\n task_work_run+0x150/0x240 kernel/task_work.c:227\r\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\r\n exit_to_user_mode_loop+0xd4\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38491"
},
{
"cve": "CVE-2025-38502",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbpf: Fix oob access in cgroup local storage\r\n\r\nLonial reported that an out-of-bounds access in cgroup local storage\r\ncan be crafted via tail calls. Given two programs each utilizing a\r\ncgroup local storage with a different value size, and one program\r\ndoing a tail call into the other. The verifier will validate each of\r\nthe indivial programs just fine. However, in the runtime context\r\nthe bpf_cg_run_ctx holds an bpf_prog_array_item which contains the\r\nBPF program as well as any cgroup local storage flavor the program\r\nuses. Helpers such as bpf_get_local_storage() pick this up from the\r\nruntime context:\r\n\r\n ctx = container_of(current-\u003ebpf_ctx, struct bpf_cg_run_ctx, run_ctx);\r\n storage = ctx-\u003eprog_item-\u003ecgroup_storage[stype];\r\n\r\n if (stype == BPF_CGROUP_STORAGE_SHARED)\r\n ptr = \u0026READ_ONCE(storage-\u003ebuf)-\u003edata[0];\r\n else\r\n ptr = this_cpu_ptr(storage-\u003epercpu_buf);\r\n\r\nFor the second program which was called from the originally attached\r\none, this means bpf_get_local_storage() will pick up the former\r\nprogram\u0027s map, not its own. With mismatching sizes, this can result\r\nin an unintended out-of-bounds access.\r\n\r\nTo fix this issue, we need to extend bpf_map_owner with an array of\r\nstorage_cookie[] to match on i) the exact maps from the original\r\nprogram if the second program was using bpf_get_local_storage(), or\r\nii) allow the tail call combination if the second program was not\r\nusing any of the cgroup local storage maps.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38502"
},
{
"cve": "CVE-2025-38552",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmptcp: plug races between subflow fail and subflow creation\r\n\r\nWe have races similar to the one addressed by the previous patch between\r\nsubflow failing and additional subflow creation. They are just harder to\r\ntrigger.\r\n\r\nThe solution is similar. Use a separate flag to track the condition\r\n\u0027socket state prevent any additional subflow creation\u0027 protected by the\r\nfallback lock.\r\n\r\nThe socket fallback makes such flag true, and also receiving or sending\r\nan MP_FAIL option.\r\n\r\nThe field \u0027allow_infinite_fallback\u0027 is now always touched under the\r\nrelevant lock, we can drop the ONCE annotation on write.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38552"
},
{
"cve": "CVE-2025-38614",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\neventpoll: Fix semi-unbounded recursion\n\nEnsure that epoll instances can never form a graph deeper than\nEP_MAX_NESTS+1 links.\n\nCurrently, ep_loop_check_proc() ensures that the graph is loop-free and\ndoes some recursion depth checks, but those recursion depth checks don\u0027t\nlimit the depth of the resulting tree for two reasons:\n\n - They don\u0027t look upwards in the tree.\n - If there are multiple downwards paths of different lengths, only one of\n the paths is actually considered for the depth check since commit\n 28d82dc1c4ed (\"epoll: limit paths\").\n\nEssentially, the current recursion depth check in ep_loop_check_proc() just\nserves to prevent it from recursing too deeply while checking for loops.\n\nA more thorough check is done in reverse_path_check() after the new graph\nedge has already been created; this checks, among other things, that no\npaths going upwards from any non-epoll file with a length of more than 5\nedges exist. However, this check does not apply to non-epoll files.\n\nAs a result, it is possible to recurse to a depth of at least roughly 500,\ntested on v6.15. (I am unsure if deeper recursion is possible; and this may\nhave changed with commit 8c44dac8add7 (\"eventpoll: Fix priority inversion\nproblem\").)\n\nTo fix it:\n\n1. In ep_loop_check_proc(), note the subtree depth of each visited node,\nand use subtree depths for the total depth calculation even when a subtree\nhas already been visited.\n2. Add ep_get_upwards_depth_proc() for similarly determining the maximum\ndepth of an upwards walk.\n3. In ep_loop_check(), use these values to limit the total path length\nbetween epoll nodes to EP_MAX_NESTS edges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38614"
},
{
"cve": "CVE-2025-38670",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\narm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack()\r\n\r\n`cpu_switch_to()` and `call_on_irq_stack()` manipulate SP to change\r\nto different stacks along with the Shadow Call Stack if it is enabled.\r\nThose two stack changes cannot be done atomically and both functions\r\ncan be interrupted by SErrors or Debug Exceptions which, though unlikely,\r\nis very much broken : if interrupted, we can end up with mismatched stacks\r\nand Shadow Call Stack leading to clobbered stacks.\r\n\r\nIn `cpu_switch_to()`, it can happen when SP_EL0 points to the new task,\r\nbut x18 stills points to the old task\u0027s SCS. When the interrupt handler\r\ntries to save the task\u0027s SCS pointer, it will save the old task\r\nSCS pointer (x18) into the new task struct (pointed to by SP_EL0),\r\nclobbering it.\r\n\r\nIn `call_on_irq_stack()`, it can happen when switching from the task stack\r\nto the IRQ stack and when switching back. In both cases, we can be\r\ninterrupted when the SCS pointer points to the IRQ SCS, but SP points to\r\nthe task stack. The nested interrupt handler pushes its return addresses\r\non the IRQ SCS. It then detects that SP points to the task stack,\r\ncalls `call_on_irq_stack()` and clobbers the task SCS pointer with\r\nthe IRQ SCS pointer, which it will also use !\r\n\r\nThis leads to tasks returning to addresses on the wrong SCS,\r\nor even on the IRQ SCS, triggering kernel panics via CONFIG_VMAP_STACK\r\nor FPAC if enabled.\r\n\r\nThis is possible on a default config, but unlikely.\r\nHowever, when enabling CONFIG_ARM64_PSEUDO_NMI, DAIF is unmasked and\r\ninstead the GIC is responsible for filtering what interrupts the CPU\r\nshould receive based on priority.\r\nGiven the goal of emulating NMIs, pseudo-NMIs can be received by the CPU\r\neven in `cpu_switch_to()` and `call_on_irq_stack()`, possibly *very*\r\nfrequently depending on the system configuration and workload, leading\r\nto unpredictable kernel panics.\r\n\r\nCompletely mask DAIF in `cpu_switch_to()` and restore it when returning.\r\nDo the same in `call_on_irq_stack()`, but restore and mask around\r\nthe branch.\r\nMask DAIF even if CONFIG_SHADOW_CALL_STACK is not enabled for consistency\r\nof behaviour between all configurations.\r\n\r\nIntroduce and use an assembly macro for saving and masking DAIF,\r\nas the existing one saves but only masks IF.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38670"
},
{
"cve": "CVE-2025-38676",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\niommu/amd: Avoid stack buffer overflow from kernel cmdline\r\n\r\nWhile the kernel command line is considered trusted in most environments,\r\navoid writing 1 byte past the end of \"acpiid\" if the \"str\" argument is\r\nmaximum length.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38676"
},
{
"cve": "CVE-2025-38677",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid out-of-boundary access in dnode page\n\nAs Jiaming Zhang reported:\n\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x1c1/0x2a0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x17e/0x800 mm/kasan/report.c:480\n kasan_report+0x147/0x180 mm/kasan/report.c:593\n data_blkaddr fs/f2fs/f2fs.h:3053 [inline]\n f2fs_data_blkaddr fs/f2fs/f2fs.h:3058 [inline]\n f2fs_get_dnode_of_data+0x1a09/0x1c40 fs/f2fs/node.c:855\n f2fs_reserve_block+0x53/0x310 fs/f2fs/data.c:1195\n prepare_write_begin fs/f2fs/data.c:3395 [inline]\n f2fs_write_begin+0xf39/0x2190 fs/f2fs/data.c:3594\n generic_perform_write+0x2c7/0x910 mm/filemap.c:4112\n f2fs_buffered_write_iter fs/f2fs/file.c:4988 [inline]\n f2fs_file_write_iter+0x1ec8/0x2410 fs/f2fs/file.c:5216\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0x546/0xa90 fs/read_write.c:686\n ksys_write+0x149/0x250 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xf3/0x3d0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nThe root cause is in the corrupted image, there is a dnode has the same\nnode id w/ its inode, so during f2fs_get_dnode_of_data(), it tries to\naccess block address in dnode at offset 934, however it parses the dnode\nas inode node, so that get_dnode_addr() returns 360, then it tries to\naccess page address from 360 + 934 * 4 = 4096 w/ 4 bytes.\n\nTo fix this issue, let\u0027s add sanity check for node id of all direct nodes\nduring f2fs_get_dnode_of_data().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38677"
},
{
"cve": "CVE-2025-38679",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: venus: Fix OOB read due to missing payload bound check\r\n\r\nCurrently, The event_seq_changed() handler processes a variable number\r\nof properties sent by the firmware. The number of properties is indicated\r\nby the firmware and used to iterate over the payload. However, the\r\npayload size is not being validated against the actual message length.\r\n\r\nThis can lead to out-of-bounds memory access if the firmware provides a\r\nproperty count that exceeds the data available in the payload. Such a\r\ncondition can result in kernel crashes or potential information leaks if\r\nmemory beyond the buffer is accessed.\r\n\r\nFix this by properly validating the remaining size of the payload before\r\neach property access and updating bounds accordingly as properties are\r\nparsed.\r\n\r\nThis ensures that property parsing is safely bounded within the received\r\nmessage buffer and protects against malformed or malicious firmware\r\nbehavior.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38679"
},
{
"cve": "CVE-2025-38680",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()\r\n\r\nThe buffer length check before calling uvc_parse_format() only ensured\r\nthat the buffer has at least 3 bytes (buflen \u003e 2), buf the function\r\naccesses buffer[3], requiring at least 4 bytes.\r\n\r\nThis can lead to an out-of-bounds read if the buffer has exactly 3 bytes.\r\n\r\nFix it by checking that the buffer has at least 4 bytes in\r\nuvc_parse_format().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38680"
},
{
"cve": "CVE-2025-38681",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()\r\n\r\nMemory hot remove unmaps and tears down various kernel page table regions\r\nas required. The ptdump code can race with concurrent modifications of\r\nthe kernel page tables. When leaf entries are modified concurrently, the\r\ndump code may log stale or inconsistent information for a VA range, but\r\nthis is otherwise not harmful.\r\n\r\nBut when intermediate levels of kernel page table are freed, the dump code\r\nwill continue to use memory that has been freed and potentially\r\nreallocated for another purpose. In such cases, the ptdump code may\r\ndereference bogus addresses, leading to a number of potential problems.\r\n\r\nTo avoid the above mentioned race condition, platforms such as arm64,\r\nriscv and s390 take memory hotplug lock, while dumping kernel page table\r\nvia the sysfs interface /sys/kernel/debug/kernel_page_tables.\r\n\r\nSimilar race condition exists while checking for pages that might have\r\nbeen marked W+X via /sys/kernel/debug/kernel_page_tables/check_wx_pages\r\nwhich in turn calls ptdump_check_wx(). Instead of solving this race\r\ncondition again, let\u0027s just move the memory hotplug lock inside generic\r\nptdump_check_wx() which will benefit both the scenarios.\r\n\r\nDrop get_online_mems() and put_online_mems() combination from all existing\r\nplatform ptdump code paths.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38681"
},
{
"cve": "CVE-2025-38683",
"cwe": {
"id": "CWE-820",
"name": "Missing Synchronization"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhv_netvsc: Fix panic during namespace deletion with VF\r\n\r\nThe existing code move the VF NIC to new namespace when NETDEV_REGISTER is\r\nreceived on netvsc NIC. During deletion of the namespace,\r\ndefault_device_exit_batch() \u003e\u003e default_device_exit_net() is called. When\r\nnetvsc NIC is moved back and registered to the default namespace, it\r\nautomatically brings VF NIC back to the default namespace. This will cause\r\nthe default_device_exit_net() \u003e\u003e for_each_netdev_safe loop unable to detect\r\nthe list end, and hit NULL ptr:\r\n\r\n[ 231.449420] mana 7870:00:00.0 enP30832s1: Moved VF to namespace with: eth0\r\n[ 231.449656] BUG: kernel NULL pointer dereference, address: 0000000000000010\r\n[ 231.450246] #PF: supervisor read access in kernel mode\r\n[ 231.450579] #PF: error_code(0x0000) - not-present page\r\n[ 231.450916] PGD 17b8a8067 P4D 0\r\n[ 231.451163] Oops: Oops: 0000 [#1] SMP NOPTI\r\n[ 231.451450] CPU: 82 UID: 0 PID: 1394 Comm: kworker/u768:1 Not tainted 6.16.0-rc4+ #3 VOLUNTARY\r\n[ 231.452042] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/21/2024\r\n[ 231.452692] Workqueue: netns cleanup_net\r\n[ 231.452947] RIP: 0010:default_device_exit_batch+0x16c/0x3f0\r\n[ 231.453326] Code: c0 0c f5 b3 e8 d5 db fe ff 48 85 c0 74 15 48 c7 c2 f8 fd ca b2 be 10 00 00 00 48 8d 7d c0 e8 7b 77 25 00 49 8b 86 28 01 00 00 \u003c48\u003e 8b 50 10 4c 8b 2a 4c 8d 62 f0 49 83 ed 10 4c 39 e0 0f 84 d6 00\r\n[ 231.454294] RSP: 0018:ff75fc7c9bf9fd00 EFLAGS: 00010246\r\n[ 231.454610] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 61c8864680b583eb\r\n[ 231.455094] RDX: ff1fa9f71462d800 RSI: ff75fc7c9bf9fd38 RDI: 0000000030766564\r\n[ 231.455686] RBP: ff75fc7c9bf9fd78 R08: 0000000000000000 R09: 0000000000000000\r\n[ 231.456126] R10: 0000000000000001 R11: 0000000000000004 R12: ff1fa9f70088e340\r\n[ 231.456621] R13: ff1fa9f70088e340 R14: ffffffffb3f50c20 R15: ff1fa9f7103e6340\r\n[ 231.457161] FS: 0000000000000000(0000) GS:ff1faa6783a08000(0000) knlGS:0000000000000000\r\n[ 231.457707] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\r\n[ 231.458031] CR2: 0000000000000010 CR3: 0000000179ab2006 CR4: 0000000000b73ef0\r\n[ 231.458434] Call Trace:\r\n[ 231.458600] \u003cTASK\u003e\r\n[ 231.458777] ops_undo_list+0x100/0x220\r\n[ 231.459015] cleanup_net+0x1b8/0x300\r\n[ 231.459285] process_one_work+0x184/0x340\r\n\r\nTo fix it, move the ns change to a workqueue, and take rtnl_lock to avoid\r\nchanging the netdev list when default_device_exit_net() is using it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38683"
},
{
"cve": "CVE-2025-38684",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/sched: ets: use old \u0027nbands\u0027 while purging unused classes\r\n\r\nShuang reported sch_ets test-case [1] crashing in ets_class_qlen_notify()\r\nafter recent changes from Lion [2]. The problem is: in ets_qdisc_change()\r\nwe purge unused DWRR queues; the value of \u0027q-\u003enbands\u0027 is the new one, and\r\nthe cleanup should be done with the old one. The problem is here since my\r\nfirst attempts to fix ets_qdisc_change(), but it surfaced again after the\r\nrecent qdisc len accounting fixes. Fix it purging idle DWRR queues before\r\nassigning a new value of \u0027q-\u003enbands\u0027, so that all purge operations find a\r\nconsistent configuration:\r\n\r\n - old \u0027q-\u003enbands\u0027 because it\u0027s needed by ets_class_find()\r\n - old \u0027q-\u003enstrict\u0027 because it\u0027s needed by ets_class_is_strict()\r\n\r\n BUG: kernel NULL pointer dereference, address: 0000000000000000\r\n #PF: supervisor read access in kernel mode\r\n #PF: error_code(0x0000) - not-present page\r\n PGD 0 P4D 0\r\n Oops: Oops: 0000 [#1] SMP NOPTI\r\n CPU: 62 UID: 0 PID: 39457 Comm: tc Kdump: loaded Not tainted 6.12.0-116.el10.x86_64 #1 PREEMPT(voluntary)\r\n Hardware name: Dell Inc. PowerEdge R640/06DKY5, BIOS 2.12.2 07/09/2021\r\n RIP: 0010:__list_del_entry_valid_or_report+0x4/0x80\r\n Code: ff 4c 39 c7 0f 84 39 19 8e ff b8 01 00 00 00 c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa \u003c48\u003e 8b 17 48 8b 4f 08 48 85 d2 0f 84 56 19 8e ff 48 85 c9 0f 84 ab\r\n RSP: 0018:ffffba186009f400 EFLAGS: 00010202\r\n RAX: 00000000000000d6 RBX: 0000000000000000 RCX: 0000000000000004\r\n RDX: ffff9f0fa29b69c0 RSI: 0000000000000000 RDI: 0000000000000000\r\n RBP: ffffffffc12c2400 R08: 0000000000000008 R09: 0000000000000004\r\n R10: ffffffffffffffff R11: 0000000000000004 R12: 0000000000000000\r\n R13: ffff9f0f8cfe0000 R14: 0000000000100005 R15: 0000000000000000\r\n FS: 00007f2154f37480(0000) GS:ffff9f269c1c0000(0000) knlGS:0000000000000000\r\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\r\n CR2: 0000000000000000 CR3: 00000001530be001 CR4: 00000000007726f0\r\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\r\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\r\n PKRU: 55555554\r\n Call Trace:\r\n \u003cTASK\u003e\r\n ets_class_qlen_notify+0x65/0x90 [sch_ets]\r\n qdisc_tree_reduce_backlog+0x74/0x110\r\n ets_qdisc_change+0x630/0xa40 [sch_ets]\r\n __tc_modify_qdisc.constprop.0+0x216/0x7f0\r\n tc_modify_qdisc+0x7c/0x120\r\n rtnetlink_rcv_msg+0x145/0x3f0\r\n netlink_rcv_skb+0x53/0x100\r\n netlink_unicast+0x245/0x390\r\n netlink_sendmsg+0x21b/0x470\r\n ____sys_sendmsg+0x39d/0x3d0\r\n ___sys_sendmsg+0x9a/0xe0\r\n __sys_sendmsg+0x7a/0xd0\r\n do_syscall_64+0x7d/0x160\r\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\r\n RIP: 0033:0x7f2155114084\r\n Code: 89 02 b8 ff ff ff ff eb bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 80 3d 25 f0 0c 00 00 74 13 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89\r\n RSP: 002b:00007fff1fd7a988 EFLAGS: 00000202 ORIG_RAX: 000000000000002e\r\n RAX: ffffffffffffffda RBX: 0000560ec063e5e0 RCX: 00007f2155114084\r\n RDX: 0000000000000000 RSI: 00007fff1fd7a9f0 RDI: 0000000000000003\r\n RBP: 00007fff1fd7aa60 R08: 0000000000000010 R09: 000000000000003f\r\n R10: 0000560ee9b3a010 R11: 0000000000000202 R12: 00007fff1fd7aae0\r\n R13: 000000006891ccde R14: 0000560ec063e5e0 R15: 00007fff1fd7aad0\r\n \u003c/TASK\u003e\r\n\r\n [1] https://lore.kernel.org/netdev/e08c7f4a6882f260011909a868311c6e9b54f3e4.1639153474.git.dcaratti@redhat.com/\r\n [2] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38684"
},
{
"cve": "CVE-2025-38685",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Fix vmalloc out-of-bounds write in fast_imageblit\n\nThis issue triggers when a userspace program does an ioctl\nFBIOPUT_CON2FBMAP by passing console number and frame buffer number.\nIdeally this maps console to frame buffer and updates the screen if\nconsole is visible.\n\nAs part of mapping it has to do resize of console according to frame\nbuffer info. if this resize fails and returns from vc_do_resize() and\ncontinues further. At this point console and new frame buffer are mapped\nand sets display vars. Despite failure still it continue to proceed\nupdating the screen at later stages where vc_data is related to previous\nframe buffer and frame buffer info and display vars are mapped to new\nframe buffer and eventully leading to out-of-bounds write in\nfast_imageblit(). This bheviour is excepted only when fg_console is\nequal to requested console which is a visible console and updates screen\nwith invalid struct references in fbcon_putcs().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38685"
},
{
"cve": "CVE-2025-38687",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncomedi: fix race between polling and detaching\r\n\r\nsyzbot reports a use-after-free in comedi in the below link, which is\r\ndue to comedi gladly removing the allocated async area even though poll\r\nrequests are still active on the wait_queue_head inside of it. This can\r\ncause a use-after-free when the poll entries are later triggered or\r\nremoved, as the memory for the wait_queue_head has been freed. We need\r\nto check there are no tasks queued on any of the subdevices\u0027 wait queues\r\nbefore allowing the device to be detached by the `COMEDI_DEVCONFIG`\r\nioctl.\r\n\r\nTasks will read-lock `dev-\u003eattach_lock` before adding themselves to the\r\nsubdevice wait queue, so fix the problem in the `COMEDI_DEVCONFIG` ioctl\r\nhandler by write-locking `dev-\u003eattach_lock` before checking that all of\r\nthe subdevices are safe to be deleted. This includes testing for any\r\nsleepers on the subdevices\u0027 wait queues. It remains locked until the\r\ndevice has been detached. This requires the `comedi_device_detach()`\r\nfunction to be refactored slightly, moving the bulk of it into new\r\nfunction `comedi_device_detach_locked()`.\r\n\r\nNote that the refactor of `comedi_device_detach()` results in\r\n`comedi_device_cancel_all()` now being called while `dev-\u003eattach_lock`\r\nis write-locked, which wasn\u0027t the case previously, but that does not\r\nmatter.\r\n\r\nThanks to Jens Axboe for diagnosing the problem and co-developing this\r\npatch.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38687"
},
{
"cve": "CVE-2025-38691",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npNFS: Fix uninited ptr deref in block/scsi layout\n\nThe error occurs on the third attempt to encode extents. When function\next_tree_prepare_commit() reallocates a larger buffer to retry encoding\nextents, the \"layoutupdate_pages\" page array is initialized only after the\nretry loop. But ext_tree_free_commitdata() is called on every iteration\nand tries to put pages in the array, thus dereferencing uninitialized\npointers.\n\nAn additional problem is that there is no limit on the maximum possible\nbuffer_size. When there are too many extents, the client may create a\nlayoutcommit that is larger than the maximum possible RPC size accepted\nby the server.\n\nDuring testing, we observed two typical scenarios. First, one memory page\nfor extents is enough when we work with small files, append data to the\nend of the file, or preallocate extents before writing. But when we fill\na new large file without preallocating, the number of extents can be huge,\nand counting the number of written extents in ext_tree_encode_commit()\ndoes not help much. Since this number increases even more between\nunlocking and locking of ext_tree, the reallocated buffer may not be\nlarge enough again and again.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38691"
},
{
"cve": "CVE-2025-38693",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar\r\n\r\nIn w7090p_tuner_write_serpar, msg is controlled by user. When msg[0].buf is null and msg[0].len is zero, former checks on msg[0].buf would be passed. If accessing msg[0].buf[2] without sanity check, null pointer deref would happen. We add\r\ncheck on msg[0].len to prevent crash.\r\n\r\nSimilar commit: commit 0ed554fd769a (\"media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()\")",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38693"
},
{
"cve": "CVE-2025-38694",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()\r\n\r\nIn dib7090p_rw_on_apb, msg is controlled by user. When msg[0].buf is null and\r\nmsg[0].len is zero, former checks on msg[0].buf would be passed. If accessing\r\nmsg[0].buf[2] without sanity check, null pointer deref would happen. We add\r\ncheck on msg[0].len to prevent crash. Similar issue occurs when access\r\nmsg[1].buf[0] and msg[1].buf[1].\r\n\r\nSimilar commit: commit 0ed554fd769a (\"media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()\")",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38694"
},
{
"cve": "CVE-2025-38695",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure\r\n\r\nIf a call to lpfc_sli4_read_rev() from lpfc_sli4_hba_setup() fails, the\r\nresultant cleanup routine lpfc_sli4_vport_delete_fcp_xri_aborted() may\r\noccur before sli4_hba.hdwqs are allocated. This may result in a null\r\npointer dereference when attempting to take the abts_io_buf_list_lock for\r\nthe first hardware queue. Fix by adding a null ptr check on\r\nphba-\u003esli4_hba.hdwq and early return because this situation means there\r\nmust have been an error during port initialization.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38695"
},
{
"cve": "CVE-2025-38696",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nMIPS: Don\u0027t crash in stack_top() for tasks without ABI or vDSO\r\n\r\nNot all tasks have an ABI associated or vDSO mapped,\r\nfor example kthreads never do.\r\nIf such a task ever ends up calling stack_top(), it will derefence the\r\nNULL ABI pointer and crash.\r\n\r\nThis can for example happen when using kunit:\r\n\r\n mips_stack_top+0x28/0xc0\r\n arch_pick_mmap_layout+0x190/0x220\r\n kunit_vm_mmap_init+0xf8/0x138\r\n __kunit_add_resource+0x40/0xa8\r\n kunit_vm_mmap+0x88/0xd8\r\n usercopy_test_init+0xb8/0x240\r\n kunit_try_run_case+0x5c/0x1a8\r\n kunit_generic_run_threadfn_adapter+0x28/0x50\r\n kthread+0x118/0x240\r\n ret_from_kernel_thread+0x14/0x1c\r\n\r\nOnly dereference the ABI point if it is set.\r\n\r\nThe GIC page is also included as it is specific to the vDSO.\r\nAlso move the randomization adjustment into the same conditional.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38696"
},
{
"cve": "CVE-2025-38697",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: upper bound check of tree index in dbAllocAG\r\n\r\nWhen computing the tree index in dbAllocAG, we never check if we are\r\nout of bounds realative to the size of the stree.\r\nThis could happen in a scenario where the filesystem metadata are\r\ncorrupted.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38697"
},
{
"cve": "CVE-2025-38698",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: Regular file corruption check\r\n\r\nThe reproducer builds a corrupted file on disk with a negative i_size value.\r\nAdd a check when opening this file to avoid subsequent operation failures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38698"
},
{
"cve": "CVE-2025-38699",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: bfa: Double-free fix\r\n\r\nWhen the bfad_im_probe() function fails during initialization, the memory\r\npointed to by bfad-\u003eim is freed without setting bfad-\u003eim to NULL.\r\n\r\nSubsequently, during driver uninstallation, when the state machine enters\r\nthe bfad_sm_stopping state and calls the bfad_im_probe_undo() function,\r\nit attempts to free the memory pointed to by bfad-\u003eim again, thereby\r\ntriggering a double-free vulnerability.\r\n\r\nSet bfad-\u003eim to NULL if probing fails.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38699"
},
{
"cve": "CVE-2025-38700",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: libiscsi: Initialize iscsi_conn-\u003edd_data only if memory is allocated\r\n\r\nIn case of an ib_fast_reg_mr allocation failure during iSER setup, the\r\nmachine hits a panic because iscsi_conn-\u003edd_data is initialized\r\nunconditionally, even when no memory is allocated (dd_size == 0). This\r\nleads invalid pointer dereference during connection teardown.\r\n\r\nFix by setting iscsi_conn-\u003edd_data only if memory is actually allocated.\r\n\r\nPanic trace:\r\n------------\r\n iser: iser_create_fastreg_desc: Failed to allocate ib_fast_reg_mr err=-12\r\n iser: iser_alloc_rx_descriptors: failed allocating rx descriptors / data buffers\r\n BUG: unable to handle page fault for address: fffffffffffffff8\r\n RIP: 0010:swake_up_locked.part.5+0xa/0x40\r\n Call Trace:\r\n complete+0x31/0x40\r\n iscsi_iser_conn_stop+0x88/0xb0 [ib_iser]\r\n iscsi_stop_conn+0x66/0xc0 [scsi_transport_iscsi]\r\n iscsi_if_stop_conn+0x14a/0x150 [scsi_transport_iscsi]\r\n iscsi_if_rx+0x1135/0x1834 [scsi_transport_iscsi]\r\n ? netlink_lookup+0x12f/0x1b0\r\n ? netlink_deliver_tap+0x2c/0x200\r\n netlink_unicast+0x1ab/0x280\r\n netlink_sendmsg+0x257/0x4f0\r\n ? _copy_from_user+0x29/0x60\r\n sock_sendmsg+0x5f/0x70",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38700"
},
{
"cve": "CVE-2025-38701",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: do not BUG when INLINE_DATA_FL lacks system.data xattr\n\nA syzbot fuzzed image triggered a BUG_ON in ext4_update_inline_data()\nwhen an inode had the INLINE_DATA_FL flag set but was missing the\nsystem.data extended attribute.\n\nSince this can happen due to a maiciouly fuzzed file system, we\nshouldn\u0027t BUG, but rather, report it as a corrupted file system.\n\nAdd similar replacements of BUG_ON with EXT4_ERROR_INODE() ii\next4_create_inline_data() and ext4_inline_data_truncate().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38701"
},
{
"cve": "CVE-2025-38702",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: fix potential buffer overflow in do_register_framebuffer()\n\nThe current implementation may lead to buffer overflow when:\n1. Unregistration creates NULL gaps in registered_fb[]\n2. All array slots become occupied despite num_registered_fb \u003c FB_MAX\n3. The registration loop exceeds array bounds\n\nAdd boundary check to prevent registered_fb[FB_MAX] access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38702"
},
{
"cve": "CVE-2025-38706",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()\r\n\r\nsnd_soc_remove_pcm_runtime() might be called with rtd == NULL which will\r\nleads to null pointer dereference.\r\nThis was reproduced with topology loading and marking a link as ignore\r\ndue to missing hardware component on the system.\r\nOn module removal the soc_tplg_remove_link() would call\r\nsnd_soc_remove_pcm_runtime() with rtd == NULL since the link was ignored,\r\nno runtime was created.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38706"
},
{
"cve": "CVE-2025-38707",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/ntfs3: Add sanity check for file name\r\n\r\nThe length of the file name should be smaller than the directory entry size.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38707"
},
{
"cve": "CVE-2025-38708",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrbd: add missing kref_get in handle_write_conflicts\n\nWith `two-primaries` enabled, DRBD tries to detect \"concurrent\" writes\nand handle write conflicts, so that even if you write to the same sector\nsimultaneously on both nodes, they end up with the identical data once\nthe writes are completed.\n\nIn handling \"superseeded\" writes, we forgot a kref_get,\nresulting in a premature drbd_destroy_device and use after free,\nand further to kernel crashes with symptoms.\n\nRelevance: No one should use DRBD as a random data generator, and apparently\nall users of \"two-primaries\" handle concurrent writes correctly on layer up.\nThat is cluster file systems use some distributed lock manager,\nand live migration in virtualization environments stops writes on one node\nbefore starting writes on the other node.\n\nWhich means that other than for \"test cases\",\nthis code path is never taken in real life.\n\nFYI, in DRBD 9, things are handled differently nowadays. We still detect\n\"write conflicts\", but no longer try to be smart about them.\nWe decided to disconnect hard instead: upper layers must not submit concurrent\nwrites. If they do, that\u0027s their fault.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38708"
},
{
"cve": "CVE-2025-38711",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsmb/server: avoid deadlock when linking with ReplaceIfExists\r\n\r\nIf smb2_create_link() is called with ReplaceIfExists set and the name\r\ndoes exist then a deadlock will happen.\r\n\r\nksmbd_vfs_kern_path_locked() will return with success and the parent\r\ndirectory will be locked. ksmbd_vfs_remove_file() will then remove the\r\nfile. ksmbd_vfs_link() will then be called while the parent is still\r\nlocked. It will try to lock the same parent and will deadlock.\r\n\r\nThis patch moves the ksmbd_vfs_kern_path_unlock() call to *before*\r\nksmbd_vfs_link() and then simplifies the code, removing the file_present\r\nflag variable.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38711"
},
{
"cve": "CVE-2025-38712",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhfsplus: don\u0027t use BUG_ON() in hfsplus_create_attributes_file()\r\n\r\nWhen the volume header contains erroneous values that do not reflect\r\nthe actual state of the filesystem, hfsplus_fill_super() assumes that\r\nthe attributes file is not yet created, which later results in hitting\r\nBUG_ON() when hfsplus_create_attributes_file() is called. Replace this\r\nBUG_ON() with -EIO error with a message to suggest running fsck tool.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38712"
},
{
"cve": "CVE-2025-38713",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()\r\n\r\nThe hfsplus_readdir() method is capable to crash by calling\r\nhfsplus_uni2asc():\r\n\r\n[ 667.121659][ T9805] ==================================================================\r\n[ 667.122651][ T9805] BUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0x902/0xa10\r\n[ 667.123627][ T9805] Read of size 2 at addr ffff88802592f40c by task repro/9805\r\n[ 667.124578][ T9805]\r\n[ 667.124876][ T9805] CPU: 3 UID: 0 PID: 9805 Comm: repro Not tainted 6.16.0-rc3 #1 PREEMPT(full)\r\n[ 667.124886][ T9805] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\r\n[ 667.124890][ T9805] Call Trace:\r\n[ 667.124893][ T9805] \u003cTASK\u003e\r\n[ 667.124896][ T9805] dump_stack_lvl+0x10e/0x1f0\r\n[ 667.124911][ T9805] print_report+0xd0/0x660\r\n[ 667.124920][ T9805] ? __virt_addr_valid+0x81/0x610\r\n[ 667.124928][ T9805] ? __phys_addr+0xe8/0x180\r\n[ 667.124934][ T9805] ? hfsplus_uni2asc+0x902/0xa10\r\n[ 667.124942][ T9805] kasan_report+0xc6/0x100\r\n[ 667.124950][ T9805] ? hfsplus_uni2asc+0x902/0xa10\r\n[ 667.124959][ T9805] hfsplus_uni2asc+0x902/0xa10\r\n[ 667.124966][ T9805] ? hfsplus_bnode_read+0x14b/0x360\r\n[ 667.124974][ T9805] hfsplus_readdir+0x845/0xfc0\r\n[ 667.124984][ T9805] ? __pfx_hfsplus_readdir+0x10/0x10\r\n[ 667.124994][ T9805] ? stack_trace_save+0x8e/0xc0\r\n[ 667.125008][ T9805] ? iterate_dir+0x18b/0xb20\r\n[ 667.125015][ T9805] ? trace_lock_acquire+0x85/0xd0\r\n[ 667.125022][ T9805] ? lock_acquire+0x30/0x80\r\n[ 667.125029][ T9805] ? iterate_dir+0x18b/0xb20\r\n[ 667.125037][ T9805] ? down_read_killable+0x1ed/0x4c0\r\n[ 667.125044][ T9805] ? putname+0x154/0x1a0\r\n[ 667.125051][ T9805] ? __pfx_down_read_killable+0x10/0x10\r\n[ 667.125058][ T9805] ? apparmor_file_permission+0x239/0x3e0\r\n[ 667.125069][ T9805] iterate_dir+0x296/0xb20\r\n[ 667.125076][ T9805] __x64_sys_getdents64+0x13c/0x2c0\r\n[ 667.125084][ T9805] ? __pfx___x64_sys_getdents64+0x10/0x10\r\n[ 667.125091][ T9805] ? __x64_sys_openat+0x141/0x200\r\n[ 667.125126][ T9805] ? __pfx_filldir64+0x10/0x10\r\n[ 667.125134][ T9805] ? do_user_addr_fault+0x7fe/0x12f0\r\n[ 667.125143][ T9805] do_syscall_64+0xc9/0x480\r\n[ 667.125151][ T9805] entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n[ 667.125158][ T9805] RIP: 0033:0x7fa8753b2fc9\r\n[ 667.125164][ T9805] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 48\r\n[ 667.125172][ T9805] RSP: 002b:00007ffe96f8e0f8 EFLAGS: 00000217 ORIG_RAX: 00000000000000d9\r\n[ 667.125181][ T9805] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa8753b2fc9\r\n[ 667.125185][ T9805] RDX: 0000000000000400 RSI: 00002000000063c0 RDI: 0000000000000004\r\n[ 667.125190][ T9805] RBP: 00007ffe96f8e110 R08: 00007ffe96f8e110 R09: 00007ffe96f8e110\r\n[ 667.125195][ T9805] R10: 0000000000000000 R11: 0000000000000217 R12: 0000556b1e3b4260\r\n[ 667.125199][ T9805] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\r\n[ 667.125207][ T9805] \u003c/TASK\u003e\r\n[ 667.125210][ T9805]\r\n[ 667.145632][ T9805] Allocated by task 9805:\r\n[ 667.145991][ T9805] kasan_save_stack+0x20/0x40\r\n[ 667.146352][ T9805] kasan_save_track+0x14/0x30\r\n[ 667.146717][ T9805] __kasan_kmalloc+0xaa/0xb0\r\n[ 667.147065][ T9805] __kmalloc_noprof+0x205/0x550\r\n[ 667.147448][ T9805] hfsplus_find_init+0x95/0x1f0\r\n[ 667.147813][ T9805] hfsplus_readdir+0x220/0xfc0\r\n[ 667.148174][ T9805] iterate_dir+0x296/0xb20\r\n[ 667.148549][ T9805] __x64_sys_getdents64+0x13c/0x2c0\r\n[ 667.148937][ T9805] do_syscall_64+0xc9/0x480\r\n[ 667.149291][ T9805] entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n[ 667.149809][ T9805]\r\n[ 667.150030][ T9805] The buggy address belongs to the object at ffff88802592f000\r\n[ 667.150030][ T9805] which belongs to the cache kmalloc-2k of size 2048\r\n[ 667.151282][ T9805] The buggy address is located 0 bytes to the right of\r\n[ 667.151282][ T9805] allocated 1036-byte region [ffff88802592f000, ffff88802592f40c)\r\n[ 667.1\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38713"
},
{
"cve": "CVE-2025-38714",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()\r\n\r\nThe hfsplus_bnode_read() method can trigger the issue:\r\n\r\n[ 174.852007][ T9784] ==================================================================\r\n[ 174.852709][ T9784] BUG: KASAN: slab-out-of-bounds in hfsplus_bnode_read+0x2f4/0x360\r\n[ 174.853412][ T9784] Read of size 8 at addr ffff88810b5fc6c0 by task repro/9784\r\n[ 174.854059][ T9784]\r\n[ 174.854272][ T9784] CPU: 1 UID: 0 PID: 9784 Comm: repro Not tainted 6.16.0-rc3 #7 PREEMPT(full)\r\n[ 174.854281][ T9784] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\r\n[ 174.854286][ T9784] Call Trace:\r\n[ 174.854289][ T9784] \u003cTASK\u003e\r\n[ 174.854292][ T9784] dump_stack_lvl+0x10e/0x1f0\r\n[ 174.854305][ T9784] print_report+0xd0/0x660\r\n[ 174.854315][ T9784] ? __virt_addr_valid+0x81/0x610\r\n[ 174.854323][ T9784] ? __phys_addr+0xe8/0x180\r\n[ 174.854330][ T9784] ? hfsplus_bnode_read+0x2f4/0x360\r\n[ 174.854337][ T9784] kasan_report+0xc6/0x100\r\n[ 174.854346][ T9784] ? hfsplus_bnode_read+0x2f4/0x360\r\n[ 174.854354][ T9784] hfsplus_bnode_read+0x2f4/0x360\r\n[ 174.854362][ T9784] hfsplus_bnode_dump+0x2ec/0x380\r\n[ 174.854370][ T9784] ? __pfx_hfsplus_bnode_dump+0x10/0x10\r\n[ 174.854377][ T9784] ? hfsplus_bnode_write_u16+0x83/0xb0\r\n[ 174.854385][ T9784] ? srcu_gp_start+0xd0/0x310\r\n[ 174.854393][ T9784] ? __mark_inode_dirty+0x29e/0xe40\r\n[ 174.854402][ T9784] hfsplus_brec_remove+0x3d2/0x4e0\r\n[ 174.854411][ T9784] __hfsplus_delete_attr+0x290/0x3a0\r\n[ 174.854419][ T9784] ? __pfx_hfs_find_1st_rec_by_cnid+0x10/0x10\r\n[ 174.854427][ T9784] ? __pfx___hfsplus_delete_attr+0x10/0x10\r\n[ 174.854436][ T9784] ? __asan_memset+0x23/0x50\r\n[ 174.854450][ T9784] hfsplus_delete_all_attrs+0x262/0x320\r\n[ 174.854459][ T9784] ? __pfx_hfsplus_delete_all_attrs+0x10/0x10\r\n[ 174.854469][ T9784] ? rcu_is_watching+0x12/0xc0\r\n[ 174.854476][ T9784] ? __mark_inode_dirty+0x29e/0xe40\r\n[ 174.854483][ T9784] hfsplus_delete_cat+0x845/0xde0\r\n[ 174.854493][ T9784] ? __pfx_hfsplus_delete_cat+0x10/0x10\r\n[ 174.854507][ T9784] hfsplus_unlink+0x1ca/0x7c0\r\n[ 174.854516][ T9784] ? __pfx_hfsplus_unlink+0x10/0x10\r\n[ 174.854525][ T9784] ? down_write+0x148/0x200\r\n[ 174.854532][ T9784] ? __pfx_down_write+0x10/0x10\r\n[ 174.854540][ T9784] vfs_unlink+0x2fe/0x9b0\r\n[ 174.854549][ T9784] do_unlinkat+0x490/0x670\r\n[ 174.854557][ T9784] ? __pfx_do_unlinkat+0x10/0x10\r\n[ 174.854565][ T9784] ? __might_fault+0xbc/0x130\r\n[ 174.854576][ T9784] ? getname_flags.part.0+0x1c5/0x550\r\n[ 174.854584][ T9784] __x64_sys_unlink+0xc5/0x110\r\n[ 174.854592][ T9784] do_syscall_64+0xc9/0x480\r\n[ 174.854600][ T9784] entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n[ 174.854608][ T9784] RIP: 0033:0x7f6fdf4c3167\r\n[ 174.854614][ T9784] Code: f0 ff ff 73 01 c3 48 8b 0d 26 0d 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 08\r\n[ 174.854622][ T9784] RSP: 002b:00007ffcb948bca8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057\r\n[ 174.854630][ T9784] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6fdf4c3167\r\n[ 174.854636][ T9784] RDX: 00007ffcb948bcc0 RSI: 00007ffcb948bcc0 RDI: 00007ffcb948bd50\r\n[ 174.854641][ T9784] RBP: 00007ffcb948cd90 R08: 0000000000000001 R09: 00007ffcb948bb40\r\n[ 174.854645][ T9784] R10: 00007f6fdf564fc0 R11: 0000000000000206 R12: 0000561e1bc9c2d0\r\n[ 174.854650][ T9784] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\r\n[ 174.854658][ T9784] \u003c/TASK\u003e\r\n[ 174.854661][ T9784]\r\n[ 174.879281][ T9784] Allocated by task 9784:\r\n[ 174.879664][ T9784] kasan_save_stack+0x20/0x40\r\n[ 174.880082][ T9784] kasan_save_track+0x14/0x30\r\n[ 174.880500][ T9784] __kasan_kmalloc+0xaa/0xb0\r\n[ 174.880908][ T9784] __kmalloc_noprof+0x205/0x550\r\n[ 174.881337][ T9784] __hfs_bnode_create+0x107/0x890\r\n[ 174.881779][ T9784] hfsplus_bnode_find+0x2d0/0xd10\r\n[ 174.882222][ T9784] hfsplus_brec_find+0x2b0/0x520\r\n[ 174.882659][ T9784] hfsplus_delete_all_attrs+0x23b/0x3\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38714"
},
{
"cve": "CVE-2025-38715",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nhfs: fix slab-out-of-bounds in hfs_bnode_read()\r\n\r\nThis patch introduces is_bnode_offset_valid() method that checks\r\nthe requested offset value. Also, it introduces\r\ncheck_and_correct_requested_length() method that checks and\r\ncorrect the requested length (if it is necessary). These methods\r\nare used in hfs_bnode_read(), hfs_bnode_write(), hfs_bnode_clear(),\r\nhfs_bnode_copy(), and hfs_bnode_move() with the goal to prevent\r\nthe access out of allocated memory and triggering the crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38715"
},
{
"cve": "CVE-2025-38721",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ctnetlink: fix refcount leak on table dump\n\nThere is a reference count leak in ctnetlink_dump_table():\n if (res \u003c 0) {\n nf_conntrack_get(\u0026ct-\u003ect_general); // HERE\n cb-\u003eargs[1] = (unsigned long)ct;\n ...\n\nWhile its very unlikely, its possible that ct == last.\nIf this happens, then the refcount of ct was already incremented.\nThis 2nd increment is never undone.\n\nThis prevents the conntrack object from being released, which in turn\nkeeps prevents cnet-\u003ecount from dropping back to 0.\n\nThis will then block the netns dismantle (or conntrack rmmod) as\nnf_conntrack_cleanup_net_list() will wait forever.\n\nThis can be reproduced by running conntrack_resize.sh selftest in a loop.\nIt takes ~20 minutes for me on a preemptible kernel on average before\nI see a runaway kworker spinning in nf_conntrack_cleanup_net_list.\n\nOne fix would to change this to:\n if (res \u003c 0) {\n\t\tif (ct != last)\n\t nf_conntrack_get(\u0026ct-\u003ect_general);\n\nBut this reference counting isn\u0027t needed in the first place.\nWe can just store a cookie value instead.\n\nA followup patch will do the same for ctnetlink_exp_dump_table,\nit looks to me as if this has the same problem and like\nctnetlink_dump_table, we only need a \u0027skip hint\u0027, not the actual\nobject so we can apply the same cookie strategy there as well.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38721"
},
{
"cve": "CVE-2025-38723",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nLoongArch: BPF: Fix jump offset calculation in tailcall\r\n\r\nThe extra pass of bpf_int_jit_compile() skips JIT context initialization\r\nwhich essentially skips offset calculation leaving out_offset = -1, so\r\nthe jmp_offset in emit_bpf_tail_call is calculated by\r\n\r\n\"#define jmp_offset (out_offset - (cur_offset))\"\r\n\r\nis a negative number, which is wrong. The final generated assembly are\r\nas follow.\r\n\r\n54:\tbgeu \t$a2, $t1, -8\t # 0x0000004c\r\n58:\taddi.d \t$a6, $s5, -1\r\n5c:\tbltz \t$a6, -16\t # 0x0000004c\r\n60:\talsl.d \t$t2, $a2, $a1, 0x3\r\n64:\tld.d \t$t2, $t2, 264\r\n68:\tbeq \t$t2, $zero, -28\t # 0x0000004c\r\n\r\nBefore apply this patch, the follow test case will reveal soft lock issues.\r\n\r\ncd tools/testing/selftests/bpf/\r\n./test_progs --allow=tailcalls/tailcall_bpf2bpf_1\r\n\r\ndmesg:\r\nwatchdog: BUG: soft lockup - CPU#2 stuck for 26s! [test_progs:25056]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38723"
},
{
"cve": "CVE-2025-38724",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()\n\nLei Lu recently reported that nfsd4_setclientid_confirm() did not check\nthe return value from get_client_locked(). a SETCLIENTID_CONFIRM could\nrace with a confirmed client expiring and fail to get a reference. That\ncould later lead to a UAF.\n\nFix this by getting a reference early in the case where there is an\nextant confirmed client. If that fails then treat it as if there were no\nconfirmed client found at all.\n\nIn the case where the unconfirmed client is expiring, just fail and\nreturn the result from get_client_locked().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38724"
},
{
"cve": "CVE-2025-38725",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: usb: asix_devices: add phy_mask for ax88772 mdio bus\r\n\r\nWithout setting phy_mask for ax88772 mdio bus, current driver may create\r\nat most 32 mdio phy devices with phy address range from 0x00 ~ 0x1f.\r\nDLink DUB-E100 H/W Ver B1 is such a device. However, only one main phy\r\ndevice will bind to net phy driver. This is creating issue during system\r\nsuspend/resume since phy_polling_mode() in phy_state_machine() will\r\ndirectly deference member of phydev-\u003edrv for non-main phy devices. Then\r\nNULL pointer dereference issue will occur. Due to only external phy or\r\ninternal phy is necessary, add phy_mask for ax88772 mdio bus to workarnoud\r\nthe issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38725"
},
{
"cve": "CVE-2025-38727",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: avoid infinite retry looping in netlink_unicast()\n\nnetlink_attachskb() checks for the socket\u0027s read memory allocation\nconstraints. Firstly, it has:\n\n rmem \u003c READ_ONCE(sk-\u003esk_rcvbuf)\n\nto check if the just increased rmem value fits into the socket\u0027s receive\nbuffer. If not, it proceeds and tries to wait for the memory under:\n\n rmem + skb-\u003etruesize \u003e READ_ONCE(sk-\u003esk_rcvbuf)\n\nThe checks don\u0027t cover the case when skb-\u003etruesize + sk-\u003esk_rmem_alloc is\nequal to sk-\u003esk_rcvbuf. Thus the function neither successfully accepts\nthese conditions, nor manages to reschedule the task - and is called in\nretry loop for indefinite time which is caught as:\n\n rcu: INFO: rcu_sched self-detected stall on CPU\n rcu: 0-....: (25999 ticks this GP) idle=ef2/1/0x4000000000000000 softirq=262269/262269 fqs=6212\n (t=26000 jiffies g=230833 q=259957)\n NMI backtrace for cpu 0\n CPU: 0 PID: 22 Comm: kauditd Not tainted 5.10.240 #68\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc42 04/01/2014\n Call Trace:\n \u003cIRQ\u003e\n dump_stack lib/dump_stack.c:120\n nmi_cpu_backtrace.cold lib/nmi_backtrace.c:105\n nmi_trigger_cpumask_backtrace lib/nmi_backtrace.c:62\n rcu_dump_cpu_stacks kernel/rcu/tree_stall.h:335\n rcu_sched_clock_irq.cold kernel/rcu/tree.c:2590\n update_process_times kernel/time/timer.c:1953\n tick_sched_handle kernel/time/tick-sched.c:227\n tick_sched_timer kernel/time/tick-sched.c:1399\n __hrtimer_run_queues kernel/time/hrtimer.c:1652\n hrtimer_interrupt kernel/time/hrtimer.c:1717\n __sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1113\n asm_call_irq_on_stack arch/x86/entry/entry_64.S:808\n \u003c/IRQ\u003e\n\n netlink_attachskb net/netlink/af_netlink.c:1234\n netlink_unicast net/netlink/af_netlink.c:1349\n kauditd_send_queue kernel/audit.c:776\n kauditd_thread kernel/audit.c:897\n kthread kernel/kthread.c:328\n ret_from_fork arch/x86/entry/entry_64.S:304\n\nRestore the original behavior of the check which commit in Fixes\naccidentally missed when restructuring the code.\n\nFound by Linux Verification Center (linuxtesting.org).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38727"
},
{
"cve": "CVE-2025-38728",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsmb3: fix for slab out of bounds on mount to ksmbd\r\n\r\nWith KASAN enabled, it is possible to get a slab out of bounds\r\nduring mount to ksmbd due to missing check in parse_server_interfaces()\r\n(see below):\r\n\r\n BUG: KASAN: slab-out-of-bounds in\r\n parse_server_interfaces+0x14ee/0x1880 [cifs]\r\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\r\n\r\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\r\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\r\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\r\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\r\n BIOS 2.13.1 06/14/2019\r\n Call Trace:\r\n \u003cTASK\u003e\r\n dump_stack_lvl+0x9f/0xf0\r\n print_report+0xd1/0x670\r\n __virt_addr_valid+0x22c/0x430\r\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\r\n ? kasan_complete_mode_report_info+0x2a/0x1f0\r\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\r\n kasan_report+0xd6/0x110\r\n parse_server_interfaces+0x14ee/0x1880 [cifs]\r\n __asan_report_load_n_noabort+0x13/0x20\r\n parse_server_interfaces+0x14ee/0x1880 [cifs]\r\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\r\n ? trace_hardirqs_on+0x51/0x60\r\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\r\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\r\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\r\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\r\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\r\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\r\n ? do_raw_spin_unlock+0x5d/0x200\r\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\r\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\r\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\r\n ? dfs_cache_find+0xe7/0x150 [cifs]\r\n dfs_mount_share+0x985/0x2970 [cifs]\r\n ? check_path.constprop.0+0x28/0x50\r\n ? save_trace+0x54/0x370\r\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\r\n ? __lock_acquire+0xb82/0x2ba0\r\n ? __kasan_check_write+0x18/0x20\r\n cifs_mount+0xbc/0x9e0 [cifs]\r\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\r\n ? do_raw_spin_unlock+0x5d/0x200\r\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\r\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-38729",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nALSA: usb-audio: Validate UAC3 power domain descriptors, too\r\n\r\nUAC3 power domain descriptors need to be verified with its variable\r\nbLength for avoiding the unexpected OOB accesses by malicious\r\nfirmware, too.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38729"
},
{
"cve": "CVE-2025-38732",
"cwe": {
"id": "CWE-911",
"name": "Improper Update of Reference Count"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_reject: don\u0027t leak dst refcount for loopback packets\r\n\r\nrecent patches to add a WARN() when replacing skb dst entry found an\r\nold bug:\r\n\r\nWARNING: include/linux/skbuff.h:1165 skb_dst_check_unset include/linux/skbuff.h:1164 [inline]\r\nWARNING: include/linux/skbuff.h:1165 skb_dst_set include/linux/skbuff.h:1210 [inline]\r\nWARNING: include/linux/skbuff.h:1165 nf_reject_fill_skb_dst+0x2a4/0x330 net/ipv4/netfilter/nf_reject_ipv4.c:234\r\n[..]\r\nCall Trace:\r\n nf_send_unreach+0x17b/0x6e0 net/ipv4/netfilter/nf_reject_ipv4.c:325\r\n nft_reject_inet_eval+0x4bc/0x690 net/netfilter/nft_reject_inet.c:27\r\n expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline]\r\n ..\r\n\r\nThis is because blamed commit forgot about loopback packets.\r\nSuch packets already have a dst_entry attached, even at PRE_ROUTING stage.\r\n\r\nInstead of checking hook just check if the skb already has a route\r\nattached to it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38732"
},
{
"cve": "CVE-2025-38735",
"cwe": {
"id": "CWE-664",
"name": "Improper Control of a Resource Through its Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ngve: prevent ethtool ops after shutdown\r\n\r\nA crash can occur if an ethtool operation is invoked\r\nafter shutdown() is called.\r\n\r\nshutdown() is invoked during system shutdown to stop DMA operations\r\nwithout performing expensive deallocations. It is discouraged to\r\nunregister the netdev in this path, so the device may still be visible\r\nto userspace and kernel helpers.\r\n\r\nIn gve, shutdown() tears down most internal data structures. If an\r\nethtool operation is dispatched after shutdown(), it will dereference\r\nfreed or NULL pointers, leading to a kernel panic. While graceful\r\nshutdown normally quiesces userspace before invoking the reboot\r\nsyscall, forced shutdowns (as observed on GCP VMs) can still trigger\r\nthis path.\r\n\r\nFix by calling netif_device_detach() in shutdown().\r\nThis marks the device as detached so the ethtool ioctl handler\r\nwill skip dispatching operations to the driver.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38735"
},
{
"cve": "CVE-2025-38736",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: usb: asix_devices: Fix PHY address mask in MDIO bus initialization\r\n\r\nSyzbot reported shift-out-of-bounds exception on MDIO bus initialization.\r\n\r\nThe PHY address should be masked to 5 bits (0-31). Without this\r\nmask, invalid PHY addresses could be used, potentially causing issues\r\nwith MDIO bus operations.\r\n\r\nFix this by masking the PHY address with 0x1f (31 decimal) to ensure\r\nit stays within the valid range.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-38736"
},
{
"cve": "CVE-2025-39673",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nppp: fix race conditions in ppp_fill_forward_path\r\n\r\nppp_fill_forward_path() has two race conditions:\r\n\r\n1. The ppp-\u003echannels list can change between list_empty() and\r\n list_first_entry(), as ppp_lock() is not held. If the only channel\r\n is deleted in ppp_disconnect_channel(), list_first_entry() may\r\n access an empty head or a freed entry, and trigger a panic.\r\n\r\n2. pch-\u003echan can be NULL. When ppp_unregister_channel() is called,\r\n pch-\u003echan is set to NULL before pch is removed from ppp-\u003echannels.\r\n\r\nFix these by using a lockless RCU approach:\r\n- Use list_first_or_null_rcu() to safely test and access the first list\r\n entry.\r\n- Convert list modifications on ppp-\u003echannels to their RCU variants and\r\n add synchronize_net() after removal.\r\n- Check for a NULL pch-\u003echan before dereferencing it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39673"
},
{
"cve": "CVE-2025-39675",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()\r\n\r\nThe function mod_hdcp_hdcp1_create_session() calls the function\r\nget_first_active_display(), but does not check its return value.\r\nThe return value is a null pointer if the display list is empty.\r\nThis will lead to a null pointer dereference.\r\n\r\nAdd a null pointer check for get_first_active_display() and return\r\nMOD_HDCP_STATUS_DISPLAY_NOT_FOUND if the function return null.\r\n\r\nThis is similar to the commit c3e9826a2202\r\n(\"drm/amd/display: Add null pointer check for get_first_active_display()\").\r\n\r\n(cherry picked from commit 5e43eb3cd731649c4f8b9134f857be62a416c893)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39675"
},
{
"cve": "CVE-2025-39676",
"cwe": {
"id": "CWE-394",
"name": "Unexpected Status Code or Return Value"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: qla4xxx: Prevent a potential error pointer dereference\r\n\r\nThe qla4xxx_get_ep_fwdb() function is supposed to return NULL on error,\r\nbut qla4xxx_ep_connect() returns error pointers. Propagating the error\r\npointers will lead to an Oops in the caller, so change the error pointers\r\nto NULL.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39676"
},
{
"cve": "CVE-2025-39681",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nx86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper\r\n\r\nSince\r\n\r\n 923f3a2b48bd (\"x86/resctrl: Query LLC monitoring properties once during boot\")\r\n\r\nresctrl_cpu_detect() has been moved from common CPU initialization code to\r\nthe vendor-specific BSP init helper, while Hygon didn\u0027t put that call in their\r\ncode.\r\n\r\nThis triggers a division by zero fault during early booting stage on our\r\nmachines with X86_FEATURE_CQM* supported, where get_rdt_mon_resources() tries\r\nto calculate mon_l3_config with uninitialized boot_cpu_data.x86_cache_occ_scale.\r\n\r\nAdd the missing resctrl_cpu_detect() in the Hygon BSP init helper.\r\n\r\n [ bp: Massage commit message. ]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39681"
},
{
"cve": "CVE-2025-39682",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntls: fix handling of zero-length records on the rx_list\r\n\r\nEach recvmsg() call must process either\r\n - only contiguous DATA records (any number of them)\r\n - one non-DATA record\r\n\r\nIf the next record has different type than what has already been\r\nprocessed we break out of the main processing loop. If the record\r\nhas already been decrypted (which may be the case for TLS 1.3 where\r\nwe don\u0027t know type until decryption) we queue the pending record\r\nto the rx_list. Next recvmsg() will pick it up from there.\r\n\r\nQueuing the skb to rx_list after zero-copy decrypt is not possible,\r\nsince in that case we decrypted directly to the user space buffer,\r\nand we don\u0027t have an skb to queue (darg.skb points to the ciphertext\r\nskb for access to metadata like length).\r\n\r\nOnly data records are allowed zero-copy, and we break the processing\r\nloop after each non-data record. So we should never zero-copy and\r\nthen find out that the record type has changed. The corner case\r\nwe missed is when the initial record comes from rx_list, and it\u0027s\r\nzero length.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39682"
},
{
"cve": "CVE-2025-39683",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Limit access to parser-\u003ebuffer when trace_get_user failed\n\nWhen the length of the string written to set_ftrace_filter exceeds\nFTRACE_BUFF_MAX, the following KASAN alarm will be triggered:\n\nBUG: KASAN: slab-out-of-bounds in strsep+0x18c/0x1b0\nRead of size 1 at addr ffff0000d00bd5ba by task ash/165\n\nCPU: 1 UID: 0 PID: 165 Comm: ash Not tainted 6.16.0-g6bcdbd62bd56-dirty\nHardware name: linux,dummy-virt (DT)\nCall trace:\n show_stack+0x34/0x50 (C)\n dump_stack_lvl+0xa0/0x158\n print_address_description.constprop.0+0x88/0x398\n print_report+0xb0/0x280\n kasan_report+0xa4/0xf0\n __asan_report_load1_noabort+0x20/0x30\n strsep+0x18c/0x1b0\n ftrace_process_regex.isra.0+0x100/0x2d8\n ftrace_regex_release+0x484/0x618\n __fput+0x364/0xa58\n ____fput+0x28/0x40\n task_work_run+0x154/0x278\n do_notify_resume+0x1f0/0x220\n el0_svc+0xec/0xf0\n el0t_64_sync_handler+0xa0/0xe8\n el0t_64_sync+0x1ac/0x1b0\n\nThe reason is that trace_get_user will fail when processing a string\nlonger than FTRACE_BUFF_MAX, but not set the end of parser-\u003ebuffer to 0.\nThen an OOB access will be triggered in ftrace_regex_release-\u003e\nftrace_process_regex-\u003estrsep-\u003estrpbrk. We can solve this problem by\nlimiting access to parser-\u003ebuffer when trace_get_user failed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39683"
},
{
"cve": "CVE-2025-39684",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncomedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl()\r\n\r\nsyzbot reports a KMSAN kernel-infoleak in `do_insn_ioctl()`. A kernel\r\nbuffer is allocated to hold `insn-\u003en` samples (each of which is an\r\n`unsigned int`). For some instruction types, `insn-\u003en` samples are\r\ncopied back to user-space, unless an error code is being returned. The\r\nproblem is that not all the instruction handlers that need to return\r\ndata to userspace fill in the whole `insn-\u003en` samples, so that there is\r\nan information leak. There is a similar syzbot report for\r\n`do_insnlist_ioctl()`, although it does not have a reproducer for it at\r\nthe time of writing.\r\n\r\nOne culprit is `insn_rw_emulate_bits()` which is used as the handler for\r\n`INSN_READ` or `INSN_WRITE` instructions for subdevices that do not have\r\na specific handler for that instruction, but do have an `INSN_BITS`\r\nhandler. For `INSN_READ` it only fills in at most 1 sample, so if\r\n`insn-\u003en` is greater than 1, the remaining `insn-\u003en - 1` samples copied\r\nto userspace will be uninitialized kernel data.\r\n\r\nAnother culprit is `vm80xx_ai_insn_read()` in the \"vm80xx\" driver. It\r\nnever returns an error, even if it fails to fill the buffer.\r\n\r\nFix it in `do_insn_ioctl()` and `do_insnlist_ioctl()` by making sure\r\nthat uninitialized parts of the allocated buffer are zeroed before\r\nhandling each instruction.\r\n\r\nThanks to Arnaud Lecomte for their fix to `do_insn_ioctl()`. That fix\r\nreplaced the call to `kmalloc_array()` with `kcalloc()`, but it is not\r\nalways necessary to clear the whole buffer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39684"
},
{
"cve": "CVE-2025-39685",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncomedi: pcl726: Prevent invalid irq number\r\n\r\nThe reproducer passed in an irq number(0x80008000) that was too large,\r\nwhich triggered the oob.\r\n\r\nAdded an interrupt number check to prevent users from passing in an irq\r\nnumber that was too large.\r\n\r\nIf `it-\u003eoptions[1]` is 31, then `1 \u003c\u003c it-\u003eoptions[1]` is still invalid\r\nbecause it shifts a 1-bit into the sign bit (which is UB in C).\r\nPossible solutions include reducing the upper bound on the\r\n`it-\u003eoptions[1]` value to 30 or lower, or using `1U \u003c\u003c it-\u003eoptions[1]`.\r\n\r\nThe old code would just not attempt to request the IRQ if the\r\n`options[1]` value were invalid. And it would still configure the\r\ndevice without interrupts even if the call to `request_irq` returned an\r\nerror. So it would be better to combine this test with the test below.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39685"
},
{
"cve": "CVE-2025-39686",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncomedi: Make insn_rw_emulate_bits() do insn-\u003en samples\r\n\r\nThe `insn_rw_emulate_bits()` function is used as a default handler for\r\n`INSN_READ` instructions for subdevices that have a handler for\r\n`INSN_BITS` but not for `INSN_READ`. Similarly, it is used as a default\r\nhandler for `INSN_WRITE` instructions for subdevices that have a handler\r\nfor `INSN_BITS` but not for `INSN_WRITE`. It works by emulating the\r\n`INSN_READ` or `INSN_WRITE` instruction handling with a constructed\r\n`INSN_BITS` instruction. However, `INSN_READ` and `INSN_WRITE`\r\ninstructions are supposed to be able read or write multiple samples,\r\nindicated by the `insn-\u003en` value, but `insn_rw_emulate_bits()` currently\r\nonly handles a single sample. For `INSN_READ`, the comedi core will\r\ncopy `insn-\u003en` samples back to user-space. (That triggered KASAN\r\nkernel-infoleak errors when `insn-\u003en` was greater than 1, but that is\r\nbeing fixed more generally elsewhere in the comedi core.)\r\n\r\nMake `insn_rw_emulate_bits()` either handle `insn-\u003en` samples, or return\r\nan error, to conform to the general expectation for `INSN_READ` and\r\n`INSN_WRITE` handlers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39686"
},
{
"cve": "CVE-2025-39687",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\niio: light: as73211: Ensure buffer holes are zeroed\r\n\r\nGiven that the buffer is copied to a kfifo that ultimately user space\r\ncan read, ensure we zero it.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39687"
},
{
"cve": "CVE-2025-39689",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Also allocate and copy hash for reading of filter files\n\nCurrently the reader of set_ftrace_filter and set_ftrace_notrace just adds\nthe pointer to the global tracer hash to its iterator. Unlike the writer\nthat allocates a copy of the hash, the reader keeps the pointer to the\nfilter hashes. This is problematic because this pointer is static across\nfunction calls that release the locks that can update the global tracer\nhashes. This can cause UAF and similar bugs.\n\nAllocate and copy the hash for reading the filter files like it is done\nfor the writers. This not only fixes UAF bugs, but also makes the code a\nbit simpler as it doesn\u0027t have to differentiate when to free the\niterator\u0027s hash between writers and readers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39689"
},
{
"cve": "CVE-2025-39691",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/buffer: fix use-after-free when call bh_read() helper\r\n\r\nThere\u0027s issue as follows:\r\nBUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110\r\nRead of size 8 at addr ffffc9000168f7f8 by task swapper/3/0\r\nCPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.16.0-862.14.0.6.x86_64\r\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\r\nCall Trace:\r\n \u003cIRQ\u003e\r\n dump_stack_lvl+0x55/0x70\r\n print_address_description.constprop.0+0x2c/0x390\r\n print_report+0xb4/0x270\r\n kasan_report+0xb8/0xf0\r\n end_buffer_read_sync+0xe3/0x110\r\n end_bio_bh_io_sync+0x56/0x80\r\n blk_update_request+0x30a/0x720\r\n scsi_end_request+0x51/0x2b0\r\n scsi_io_completion+0xe3/0x480\r\n ? scsi_device_unbusy+0x11e/0x160\r\n blk_complete_reqs+0x7b/0x90\r\n handle_softirqs+0xef/0x370\r\n irq_exit_rcu+0xa5/0xd0\r\n sysvec_apic_timer_interrupt+0x6e/0x90\r\n \u003c/IRQ\u003e\r\n\r\n Above issue happens when do ntfs3 filesystem mount, issue may happens\r\n as follows:\r\n mount IRQ\r\nntfs_fill_super\r\n read_cache_page\r\n do_read_cache_folio\r\n filemap_read_folio\r\n mpage_read_folio\r\n\t do_mpage_readpage\r\n\t ntfs_get_block_vbo\r\n\t bh_read\r\n\t submit_bh\r\n\t wait_on_buffer(bh);\r\n\t blk_complete_reqs\r\n\t\t\t\t scsi_io_completion\r\n\t\t\t\t scsi_end_request\r\n\t\t\t\t blk_update_request\r\n\t\t\t\t end_bio_bh_io_sync\r\n\t\t\t\t\t end_buffer_read_sync\r\n\t\t\t\t\t __end_buffer_read_notouch\r\n\t\t\t\t\t unlock_buffer\r\n\r\n wait_on_buffer(bh);--\u003e return will return to caller\r\n\r\n\t\t\t\t\t put_bh\r\n\t\t\t\t\t --\u003e trigger stack-out-of-bounds\r\nIn the mpage_read_folio() function, the stack variable \u0027map_bh\u0027 is\r\npassed to ntfs_get_block_vbo(). Once unlock_buffer() unlocks and\r\nwait_on_buffer() returns to continue processing, the stack variable\r\nis likely to be reclaimed. Consequently, during the end_buffer_read_sync()\r\nprocess, calling put_bh() may result in stack overrun.\r\n\r\nIf the bh is not allocated on the stack, it belongs to a folio. Freeing\r\na buffer head which belongs to a folio is done by drop_buffers() which\r\nwill fail to free buffers which are still locked. So it is safe to call\r\nput_bh() before __end_buffer_read_notouch().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39691"
},
{
"cve": "CVE-2025-39692",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsmb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy()\r\n\r\nWe can\u0027t call destroy_workqueue(smb_direct_wq); before stop_sessions()!\r\n\r\nOtherwise already existing connections try to use smb_direct_wq as\r\na NULL pointer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39692"
},
{
"cve": "CVE-2025-39693",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amd/display: Avoid a NULL pointer dereference\r\n\r\n[WHY]\r\nAlthough unlikely drm_atomic_get_new_connector_state() or\r\ndrm_atomic_get_old_connector_state() can return NULL.\r\n\r\n[HOW]\r\nCheck returns before dereference.\r\n\r\n(cherry picked from commit 1e5e8d672fec9f2ab352be121be971877bff2af9)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39693"
},
{
"cve": "CVE-2025-39694",
"cwe": {
"id": "CWE-1285",
"name": "Improper Validation of Specified Index, Position, or Offset in Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ns390/sclp: Fix SCCB present check\r\n\r\nTracing code called by the SCLP interrupt handler contains early exits\r\nif the SCCB address associated with an interrupt is NULL. This check is\r\nperformed after physical to virtual address translation.\r\n\r\nIf the kernel identity mapping does not start at address zero, the\r\nresulting virtual address is never zero, so that the NULL checks won\u0027t\r\nwork. Subsequently this may result in incorrect accesses to the first\r\npage of the identity mapping.\r\n\r\nFix this by introducing a function that handles the NULL case before\r\naddress translation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39694"
},
{
"cve": "CVE-2025-39697",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a race when updating an existing write\n\nAfter nfs_lock_and_join_requests() tests for whether the request is\nstill attached to the mapping, nothing prevents a call to\nnfs_inode_remove_request() from succeeding until we actually lock the\npage group.\nThe reason is that whoever called nfs_inode_remove_request() doesn\u0027t\nnecessarily have a lock on the page group head.\n\nSo in order to avoid races, let\u0027s take the page group lock earlier in\nnfs_lock_and_join_requests(), and hold it across the removal of the\nrequest in nfs_inode_remove_request().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39697"
},
{
"cve": "CVE-2025-39701",
"cwe": {
"id": "CWE-1025",
"name": "Comparison Using Wrong Factors"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nACPI: pfr_update: Fix the driver update version check\r\n\r\nThe security-version-number check should be used rather\r\nthan the runtime version check for driver updates.\r\n\r\nOtherwise, the firmware update would fail when the update binary had\r\na lower runtime version number than the current one.\r\n\r\n[ rjw: Changelog edits ]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39701"
},
{
"cve": "CVE-2025-39702",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nipv6: sr: Fix MAC comparison to be constant-time\r\n\r\nTo prevent timing attacks, MACs need to be compared in constant time.\r\nUse the appropriate helper function for this.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39702"
},
{
"cve": "CVE-2025-39703",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet, hsr: reject HSR frame if skb can\u0027t hold tag\r\n\r\nReceiving HSR frame with insufficient space to hold HSR tag in the skb\r\ncan result in a crash (kernel BUG):\r\n\r\n[ 45.390915] skbuff: skb_under_panic: text:ffffffff86f32cac len:26 put:14 head:ffff888042418000 data:ffff888042417ff4 tail:0xe end:0x180 dev:bridge_slave_1\r\n[ 45.392559] ------------[ cut here ]------------\r\n[ 45.392912] kernel BUG at net/core/skbuff.c:211!\r\n[ 45.393276] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI\r\n[ 45.393809] CPU: 1 UID: 0 PID: 2496 Comm: reproducer Not tainted 6.15.0 #12 PREEMPT(undef)\r\n[ 45.394433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\r\n[ 45.395273] RIP: 0010:skb_panic+0x15b/0x1d0\r\n\r\n\u003csnip registers, remove unreliable trace\u003e\r\n\r\n[ 45.402911] Call Trace:\r\n[ 45.403105] \u003cIRQ\u003e\r\n[ 45.404470] skb_push+0xcd/0xf0\r\n[ 45.404726] br_dev_queue_push_xmit+0x7c/0x6c0\r\n[ 45.406513] br_forward_finish+0x128/0x260\r\n[ 45.408483] __br_forward+0x42d/0x590\r\n[ 45.409464] maybe_deliver+0x2eb/0x420\r\n[ 45.409763] br_flood+0x174/0x4a0\r\n[ 45.410030] br_handle_frame_finish+0xc7c/0x1bc0\r\n[ 45.411618] br_handle_frame+0xac3/0x1230\r\n[ 45.413674] __netif_receive_skb_core.constprop.0+0x808/0x3df0\r\n[ 45.422966] __netif_receive_skb_one_core+0xb4/0x1f0\r\n[ 45.424478] __netif_receive_skb+0x22/0x170\r\n[ 45.424806] process_backlog+0x242/0x6d0\r\n[ 45.425116] __napi_poll+0xbb/0x630\r\n[ 45.425394] net_rx_action+0x4d1/0xcc0\r\n[ 45.427613] handle_softirqs+0x1a4/0x580\r\n[ 45.427926] do_softirq+0x74/0x90\r\n[ 45.428196] \u003c/IRQ\u003e\r\n\r\nThis issue was found by syzkaller.\r\n\r\nThe panic happens in br_dev_queue_push_xmit() once it receives a\r\ncorrupted skb with ETH header already pushed in linear data. When it\r\nattempts the skb_push() call, there\u0027s not enough headroom and\r\nskb_push() panics.\r\n\r\nThe corrupted skb is put on the queue by HSR layer, which makes a\r\nsequence of unintended transformations when it receives a specific\r\ncorrupted HSR frame (with incomplete TAG).\r\n\r\nFix it by dropping and consuming frames that are not long enough to\r\ncontain both ethernet and hsr headers.\r\n\r\nAlternative fix would be to check for enough headroom before skb_push()\r\nin br_dev_queue_push_xmit().\r\n\r\nIn the reproducer, this is injected via AF_PACKET, but I don\u0027t easily\r\nsee why it couldn\u0027t be sent over the wire from adjacent network.\r\n\r\nFurther Details:\r\n\r\nIn the reproducer, the following network interface chain is set up:\r\n\r\n\u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510 \u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510\r\n\u2502 veth0_to_hsr \u251c\u2500\u2500\u2500\u2524 hsr_slave0 \u253c\u2500\u2500\u2500\u2510\r\n\u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518 \u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518 \u2502\r\n \u2502 \u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2510\r\n \u251c\u2500\u2524 hsr0 \u251c\u2500\u2500\u2500\u2510\r\n \u2502 \u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2518 \u2502\r\n\u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510 \u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510 \u2502 \u2502\u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510\r\n\u2502 veth1_to_hsr \u253c\u2500\u2500\u2500\u2524 hsr_slave1 \u251c\u2500\u2500\u2500\u2518 \u2514\u2524 \u2502\r\n\u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518 \u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518 \u250c\u253c bridge \u2502\r\n \u2502\u2502 \u2502\r\n \u2502\u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518\r\n \u2502\r\n \u250c\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2510 \u2502\r\n \u2502 ... \u251c\u2500\u2500\u2500\u2500\u2500\u2500\u2518\r\n \u2514\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2518\r\n\r\nTo trigger the events leading up to crash, reproducer sends a corrupted\r\nHSR fr\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39703"
},
{
"cve": "CVE-2025-39706",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/amdkfd: Destroy KFD debugfs after destroy KFD wq\r\n\r\nSince KFD proc content was moved to kernel debugfs, we can\u0027t destroy KFD\r\ndebugfs before kfd_process_destroy_wq. Move kfd_process_destroy_wq prior\r\nto kfd_debugfs_fini to fix a kernel NULL pointer problem. It happens\r\nwhen /sys/kernel/debug/kfd was already destroyed in kfd_debugfs_fini but\r\nkfd_process_destroy_wq calls kfd_debugfs_remove_process. This line\r\n debugfs_remove_recursive(entry-\u003eproc_dentry);\r\ntries to remove /sys/kernel/debug/kfd/proc/\u003cpid\u003e while\r\n/sys/kernel/debug/kfd is already gone. It hangs the kernel by kernel\r\nNULL pointer.\r\n\r\n(cherry picked from commit 0333052d90683d88531558dcfdbf2525cc37c233)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39706"
},
{
"cve": "CVE-2025-39709",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: venus: protect against spurious interrupts during probe\r\n\r\nMake sure the interrupt handler is initialized before the interrupt is\r\nregistered.\r\n\r\nIf the IRQ is registered before hfi_create(), it\u0027s possible that an\r\ninterrupt fires before the handler setup is complete, leading to a NULL\r\ndereference.\r\n\r\nThis error condition has been observed during system boot on Rb3Gen2.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39709"
},
{
"cve": "CVE-2025-39710",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: venus: Add a check for packet size after reading from shared memory\r\n\r\nAdd a check to ensure that the packet size does not exceed the number of\r\navailable words after reading the packet header from shared memory. This\r\nensures that the size provided by the firmware is safe to process and\r\nprevent potential out-of-bounds memory access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39710"
},
{
"cve": "CVE-2025-39713",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()\r\n\r\nIn the interrupt handler rain_interrupt(), the buffer full check on\r\nrain-\u003ebuf_len is performed before acquiring rain-\u003ebuf_lock. This\r\ncreates a Time-of-Check to Time-of-Use (TOCTOU) race condition, as\r\nrain-\u003ebuf_len is concurrently accessed and modified in the work\r\nhandler rain_irq_work_handler() under the same lock.\r\n\r\nMultiple interrupt invocations can race, with each reading buf_len\r\nbefore it becomes full and then proceeding. This can lead to both\r\ninterrupts attempting to write to the buffer, incrementing buf_len\r\nbeyond its capacity (DATA_SIZE) and causing a buffer overflow.\r\n\r\nFix this bug by moving the spin_lock() to before the buffer full\r\ncheck. This ensures that the check and the subsequent buffer modification\r\nare performed atomically, preventing the race condition. An corresponding\r\nspin_unlock() is added to the overflow path to correctly release the\r\nlock.\r\n\r\nThis possible bug was found by an experimental static analysis tool\r\ndeveloped by our team.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39713"
},
{
"cve": "CVE-2025-39714",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmedia: usbtv: Lock resolution while streaming\r\n\r\nWhen an program is streaming (ffplay) and another program (qv4l2)\r\nchanges the TV standard from NTSC to PAL, the kernel crashes due to trying\r\nto copy to unmapped memory.\r\n\r\nChanging from NTSC to PAL increases the resolution in the usbtv struct,\r\nbut the video plane buffer isn\u0027t adjusted, so it overflows.\r\n\r\n[hverkuil: call vb2_is_busy instead of vb2_is_streaming]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39714"
},
{
"cve": "CVE-2025-39715",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nparisc: Revise gateway LWS calls to probe user read access\r\n\r\nWe use load and stbys,e instructions to trigger memory reference\r\ninterruptions without writing to memory. Because of the way read\r\naccess support is implemented, read access interruptions are only\r\ntriggered at privilege levels 2 and 3. The kernel and gateway\r\npage execute at privilege level 0, so this code never triggers\r\na read access interruption. Thus, it is currently possible for\r\nuser code to execute a LWS compare and swap operation at an\r\naddress that is read protected at privilege level 3 (PRIV_USER).\r\n\r\nFix this by probing read access rights at privilege level 3 and\r\nbranching to lws_fault if access isn\u0027t allowed.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39715"
},
{
"cve": "CVE-2025-39716",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nparisc: Revise __get_user() to probe user read access\r\n\r\nBecause of the way read access support is implemented, read access\r\ninterruptions are only triggered at privilege levels 2 and 3. The\r\nkernel executes at privilege level 0, so __get_user() never triggers\r\na read access interruption (code 26). Thus, it is currently possible\r\nfor user code to access a read protected address via a system call.\r\n\r\nFix this by probing read access rights at privilege level 3 (PRIV_USER)\r\nand setting __gu_err to -EFAULT (-14) if access isn\u0027t allowed.\r\n\r\nNote the cmpiclr instruction does a 32-bit compare because COND macro\r\ndoesn\u0027t work inside asm.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39716"
},
{
"cve": "CVE-2025-39718",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nvsock/virtio: Validate length in packet header before skb_put()\r\n\r\nWhen receiving a vsock packet in the guest, only the virtqueue buffer\r\nsize is validated prior to virtio_vsock_skb_rx_put(). Unfortunately,\r\nvirtio_vsock_skb_rx_put() uses the length from the packet header as the\r\nlength argument to skb_put(), potentially resulting in SKB overflow if\r\nthe host has gone wonky.\r\n\r\nValidate the length as advertised by the packet header before calling\r\nvirtio_vsock_skb_rx_put().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39718"
},
{
"cve": "CVE-2025-39719",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\niio: imu: bno055: fix OOB access of hw_xlate array\r\n\r\nFix a potential out-of-bounds array access of the hw_xlate array in\r\nbno055.c.\r\n\r\nIn bno055_get_regmask(), hw_xlate was iterated over the length of the\r\nvals array instead of the length of the hw_xlate array. In the case of\r\nbno055_gyr_scale, the vals array is larger than the hw_xlate array,\r\nso this could result in an out-of-bounds access. In practice, this\r\nshouldn\u0027t happen though because a match should always be found which\r\nbreaks out of the for loop before it iterates beyond the end of the\r\nhw_xlate array.\r\n\r\nBy adding a new hw_xlate_len field to the bno055_sysfs_attr, we can be\r\nsure we are iterating over the correct length.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39719"
},
{
"cve": "CVE-2025-39724",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: fix panic due to PSLVERR\n\nWhen the PSLVERR_RESP_EN parameter is set to 1, the device generates\nan error response if an attempt is made to read an empty RBR (Receive\nBuffer Register) while the FIFO is enabled.\n\nIn serial8250_do_startup(), calling serial_port_out(port, UART_LCR,\nUART_LCR_WLEN8) triggers dw8250_check_lcr(), which invokes\ndw8250_force_idle() and serial8250_clear_and_reinit_fifos(). The latter\nfunction enables the FIFO via serial_out(p, UART_FCR, p-\u003efcr).\nExecution proceeds to the serial_port_in(port, UART_RX).\nThis satisfies the PSLVERR trigger condition.\n\nWhen another CPU (e.g., using printk()) is accessing the UART (UART\nis busy), the current CPU fails the check (value \u0026 ~UART_LCR_SPAR) ==\n(lcr \u0026 ~UART_LCR_SPAR) in dw8250_check_lcr(), causing it to enter\ndw8250_force_idle().\n\nPut serial_port_out(port, UART_LCR, UART_LCR_WLEN8) under the port-\u003elock\nto fix this issue.\n\nPanic backtrace:\n[ 0.442336] Oops - unknown exception [#1]\n[ 0.442343] epc : dw8250_serial_in32+0x1e/0x4a\n[ 0.442351] ra : serial8250_do_startup+0x2c8/0x88e\n...\n[ 0.442416] console_on_rootfs+0x26/0x70",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39724"
},
{
"cve": "CVE-2025-39736",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock\r\n\r\nWhen netpoll is enabled, calling pr_warn_once() while holding\r\nkmemleak_lock in mem_pool_alloc() can cause a deadlock due to lock\r\ninversion with the netconsole subsystem. This occurs because\r\npr_warn_once() may trigger netpoll, which eventually leads to\r\n__alloc_skb() and back into kmemleak code, attempting to reacquire\r\nkmemleak_lock.\r\n\r\nThis is the path for the deadlock.\r\n\r\nmem_pool_alloc()\r\n -\u003e raw_spin_lock_irqsave(\u0026kmemleak_lock, flags);\r\n -\u003e pr_warn_once()\r\n -\u003e netconsole subsystem\r\n\t -\u003e netpoll\r\n\t -\u003e __alloc_skb\r\n\t\t -\u003e __create_object\r\n\t\t -\u003e raw_spin_lock_irqsave(\u0026kmemleak_lock, flags);\r\n\r\nFix this by setting a flag and issuing the pr_warn_once() after\r\nkmemleak_lock is released.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39736"
},
{
"cve": "CVE-2025-39737",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm/kmemleak: avoid soft lockup in __kmemleak_do_cleanup()\r\n\r\nA soft lockup warning was observed on a relative small system x86-64\r\nsystem with 16 GB of memory when running a debug kernel with kmemleak\r\nenabled.\r\n\r\n watchdog: BUG: soft lockup - CPU#8 stuck for 33s! [kworker/8:1:134]\r\n\r\nThe test system was running a workload with hot unplug happening in\r\nparallel. Then kemleak decided to disable itself due to its inability to\r\nallocate more kmemleak objects. The debug kernel has its\r\nCONFIG_DEBUG_KMEMLEAK_MEM_POOL_SIZE set to 40,000.\r\n\r\nThe soft lockup happened in kmemleak_do_cleanup() when the existing\r\nkmemleak objects were being removed and deleted one-by-one in a loop via a\r\nworkqueue. In this particular case, there are at least 40,000 objects\r\nthat need to be processed and given the slowness of a debug kernel and the\r\nfact that a raw_spinlock has to be acquired and released in\r\n__delete_object(), it could take a while to properly handle all these\r\nobjects.\r\n\r\nAs kmemleak has been disabled in this case, the object removal and\r\ndeletion process can be further optimized as locking isn\u0027t really needed. \r\nHowever, it is probably not worth the effort to optimize for such an edge\r\ncase that should rarely happen. So the simple solution is to call\r\ncond_resched() at periodic interval in the iteration loop to avoid soft\r\nlockup.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39737"
},
{
"cve": "CVE-2025-39738",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbtrfs: do not allow relocation of partially dropped subvolumes\r\n\r\n[BUG]\r\nThere is an internal report that balance triggered transaction abort,\r\nwith the following call trace:\r\n\r\n item 85 key (594509824 169 0) itemoff 12599 itemsize 33\r\n extent refs 1 gen 197740 flags 2\r\n ref#0: tree block backref root 7\r\n item 86 key (594558976 169 0) itemoff 12566 itemsize 33\r\n extent refs 1 gen 197522 flags 2\r\n ref#0: tree block backref root 7\r\n ...\r\n BTRFS error (device loop0): extent item not found for insert, bytenr 594526208 num_bytes 16384 parent 449921024 root_objectid 934 owner 1 offset 0\r\n BTRFS error (device loop0): failed to run delayed ref for logical 594526208 num_bytes 16384 type 182 action 1 ref_mod 1: -117\r\n ------------[ cut here ]------------\r\n BTRFS: Transaction aborted (error -117)\r\n WARNING: CPU: 1 PID: 6963 at ../fs/btrfs/extent-tree.c:2168 btrfs_run_delayed_refs+0xfa/0x110 [btrfs]\r\n\r\nAnd btrfs check doesn\u0027t report anything wrong related to the extent\r\ntree.\r\n\r\n[CAUSE]\r\nThe cause is a little complex, firstly the extent tree indeed doesn\u0027t\r\nhave the backref for 594526208.\r\n\r\nThe extent tree only have the following two backrefs around that bytenr\r\non-disk:\r\n\r\n item 65 key (594509824 METADATA_ITEM 0) itemoff 13880 itemsize 33\r\n refs 1 gen 197740 flags TREE_BLOCK\r\n tree block skinny level 0\r\n (176 0x7) tree block backref root CSUM_TREE\r\n item 66 key (594558976 METADATA_ITEM 0) itemoff 13847 itemsize 33\r\n refs 1 gen 197522 flags TREE_BLOCK\r\n tree block skinny level 0\r\n (176 0x7) tree block backref root CSUM_TREE\r\n\r\nBut the such missing backref item is not an corruption on disk, as the\r\noffending delayed ref belongs to subvolume 934, and that subvolume is\r\nbeing dropped:\r\n\r\n item 0 key (934 ROOT_ITEM 198229) itemoff 15844 itemsize 439\r\n generation 198229 root_dirid 256 bytenr 10741039104 byte_limit 0 bytes_used 345571328\r\n last_snapshot 198229 flags 0x1000000000001(RDONLY) refs 0\r\n drop_progress key (206324 EXTENT_DATA 2711650304) drop_level 2\r\n level 2 generation_v2 198229\r\n\r\nAnd that offending tree block 594526208 is inside the dropped range of\r\nthat subvolume. That explains why there is no backref item for that\r\nbytenr and why btrfs check is not reporting anything wrong.\r\n\r\nBut this also shows another problem, as btrfs will do all the orphan\r\nsubvolume cleanup at a read-write mount.\r\n\r\nSo half-dropped subvolume should not exist after an RW mount, and\r\nbalance itself is also exclusive to subvolume cleanup, meaning we\r\nshouldn\u0027t hit a subvolume half-dropped during relocation.\r\n\r\nThe root cause is, there is no orphan item for this subvolume.\r\nIn fact there are 5 subvolumes from around 2021 that have the same\r\nproblem.\r\n\r\nIt looks like the original report has some older kernels running, and\r\ncaused those zombie subvolumes.\r\n\r\nThankfully upstream commit 8d488a8c7ba2 (\"btrfs: fix subvolume/snapshot\r\ndeletion not triggered on mount\") has long fixed the bug.\r\n\r\n[ENHANCEMENT]\r\nFor repairing such old fs, btrfs-progs will be enhanced.\r\n\r\nConsidering how delayed the problem will show up (at run delayed ref\r\ntime) and at that time we have to abort transaction already, it is too\r\nlate.\r\n\r\nInstead here we reject any half-dropped subvolume for reloc tree at the\r\nearliest time, preventing confusion and extra time wasted on debugging\r\nsimilar bugs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39738"
},
{
"cve": "CVE-2025-39742",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nRDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()\r\n\r\nThe function divides number of online CPUs by num_core_siblings, and\r\nlater checks the divider by zero. This implies a possibility to get\r\nand divide-by-zero runtime error. Fix it by moving the check prior to\r\ndivision. This also helps to save one indentation level.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39742"
},
{
"cve": "CVE-2025-39743",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njfs: truncate good inode pages when hard link is 0\r\n\r\nThe fileset value of the inode copy from the disk by the reproducer is\r\nAGGR_RESERVED_I. When executing evict, its hard link number is 0, so its\r\ninode pages are not truncated. This causes the bugon to be triggered when\r\nexecuting clear_inode() because nrpages is greater than 0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39743"
},
{
"cve": "CVE-2025-39749",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nrcu: Protect -\u003edefer_qs_iw_pending from data race\r\n\r\nOn kernels built with CONFIG_IRQ_WORK=y, when rcu_read_unlock() is\r\ninvoked within an interrupts-disabled region of code [1], it will invoke\r\nrcu_read_unlock_special(), which uses an irq-work handler to force the\r\nsystem to notice when the RCU read-side critical section actually ends.\r\nThat end won\u0027t happen until interrupts are enabled at the soonest.\r\n\r\nIn some kernels, such as those booted with rcutree.use_softirq=y, the\r\nirq-work handler is used unconditionally.\r\n\r\nThe per-CPU rcu_data structure\u0027s -\u003edefer_qs_iw_pending field is\r\nupdated by the irq-work handler and is both read and updated by\r\nrcu_read_unlock_special(). This resulted in the following KCSAN splat:\r\n\r\n------------------------------------------------------------------------\r\n\r\nBUG: KCSAN: data-race in rcu_preempt_deferred_qs_handler / rcu_read_unlock_special\r\n\r\nread to 0xffff96b95f42d8d8 of 1 bytes by task 90 on cpu 8:\r\n rcu_read_unlock_special+0x175/0x260\r\n __rcu_read_unlock+0x92/0xa0\r\n rt_spin_unlock+0x9b/0xc0\r\n __local_bh_enable+0x10d/0x170\r\n __local_bh_enable_ip+0xfb/0x150\r\n rcu_do_batch+0x595/0xc40\r\n rcu_cpu_kthread+0x4e9/0x830\r\n smpboot_thread_fn+0x24d/0x3b0\r\n kthread+0x3bd/0x410\r\n ret_from_fork+0x35/0x40\r\n ret_from_fork_asm+0x1a/0x30\r\n\r\nwrite to 0xffff96b95f42d8d8 of 1 bytes by task 88 on cpu 8:\r\n rcu_preempt_deferred_qs_handler+0x1e/0x30\r\n irq_work_single+0xaf/0x160\r\n run_irq_workd+0x91/0xc0\r\n smpboot_thread_fn+0x24d/0x3b0\r\n kthread+0x3bd/0x410\r\n ret_from_fork+0x35/0x40\r\n ret_from_fork_asm+0x1a/0x30\r\n\r\nno locks held by irq_work/8/88.\r\nirq event stamp: 200272\r\nhardirqs last enabled at (200272): [\u003cffffffffb0f56121\u003e] finish_task_switch+0x131/0x320\r\nhardirqs last disabled at (200271): [\u003cffffffffb25c7859\u003e] __schedule+0x129/0xd70\r\nsoftirqs last enabled at (0): [\u003cffffffffb0ee093f\u003e] copy_process+0x4df/0x1cc0\r\nsoftirqs last disabled at (0): [\u003c0000000000000000\u003e] 0x0\r\n\r\n------------------------------------------------------------------------\r\n\r\nThe problem is that irq-work handlers run with interrupts enabled, which\r\nmeans that rcu_preempt_deferred_qs_handler() could be interrupted,\r\nand that interrupt handler might contain an RCU read-side critical\r\nsection, which might invoke rcu_read_unlock_special(). In the strict\r\nKCSAN mode of operation used by RCU, this constitutes a data race on\r\nthe -\u003edefer_qs_iw_pending field.\r\n\r\nThis commit therefore disables interrupts across the portion of the\r\nrcu_preempt_deferred_qs_handler() that updates the -\u003edefer_qs_iw_pending\r\nfield. This suffices because this handler is not a fast path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39749"
},
{
"cve": "CVE-2025-39752",
"cwe": {
"id": "CWE-364",
"name": "Signal Handler Race Condition"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nARM: rockchip: fix kernel hang during smp initialization\r\n\r\nIn order to bring up secondary CPUs main CPU write trampoline\r\ncode to SRAM. The trampoline code is written while secondary\r\nCPUs are powered on (at least that true for RK3188 CPU).\r\nSometimes that leads to kernel hang. Probably because secondary\r\nCPU execute trampoline code while kernel doesn\u0027t expect.\r\n\r\nThe patch moves SRAM initialization step to the point where all\r\nsecondary CPUs are powered down.\r\n\r\nThat fixes rarely hangs on RK3188:\r\n[ 0.091568] CPU0: thread -1, cpu 0, socket 0, mpidr 80000000\r\n[ 0.091996] rockchip_smp_prepare_cpus: ncores 4",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39752"
},
{
"cve": "CVE-2025-39756",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: Prevent file descriptor table allocations exceeding INT_MAX\n\nWhen sysctl_nr_open is set to a very high value (for example, 1073741816\nas set by systemd), processes attempting to use file descriptors near\nthe limit can trigger massive memory allocation attempts that exceed\nINT_MAX, resulting in a WARNING in mm/slub.c:\n\n WARNING: CPU: 0 PID: 44 at mm/slub.c:5027 __kvmalloc_node_noprof+0x21a/0x288\n\nThis happens because kvmalloc_array() and kvmalloc() check if the\nrequested size exceeds INT_MAX and emit a warning when the allocation is\nnot flagged with __GFP_NOWARN.\n\nSpecifically, when nr_open is set to 1073741816 (0x3ffffff8) and a\nprocess calls dup2(oldfd, 1073741880), the kernel attempts to allocate:\n- File descriptor array: 1073741880 * 8 bytes = 8,589,935,040 bytes\n- Multiple bitmaps: ~400MB\n- Total allocation size: \u003e 8GB (exceeding INT_MAX = 2,147,483,647)\n\nReproducer:\n1. Set /proc/sys/fs/nr_open to 1073741816:\n # echo 1073741816 \u003e /proc/sys/fs/nr_open\n\n2. Run a program that uses a high file descriptor:\n #include \u003cunistd.h\u003e\n #include \u003csys/resource.h\u003e\n\n int main() {\n struct rlimit rlim = {1073741824, 1073741824};\n setrlimit(RLIMIT_NOFILE, \u0026rlim);\n dup2(2, 1073741880); // Triggers the warning\n return 0;\n }\n\n3. Observe WARNING in dmesg at mm/slub.c:5027\n\nsystemd commit a8b627a introduced automatic bumping of fs.nr_open to the\nmaximum possible value. The rationale was that systems with memory\ncontrol groups (memcg) no longer need separate file descriptor limits\nsince memory is properly accounted. However, this change overlooked\nthat:\n\n1. The kernel\u0027s allocation functions still enforce INT_MAX as a maximum\n size regardless of memcg accounting\n2. Programs and tests that legitimately test file descriptor limits can\n inadvertently trigger massive allocations\n3. The resulting allocations (\u003e8GB) are impractical and will always fail\n\nsystemd\u0027s algorithm starts with INT_MAX and keeps halving the value\nuntil the kernel accepts it. On most systems, this results in nr_open\nbeing set to 1073741816 (0x3ffffff8), which is just under 1GB of file\ndescriptors.\n\nWhile processes rarely use file descriptors near this limit in normal\noperation, certain selftests (like\ntools/testing/selftests/core/unshare_test.c) and programs that test file\ndescriptor limits can trigger this issue.\n\nFix this by adding a check in alloc_fdtable() to ensure the requested\nallocation size does not exceed INT_MAX. This causes the operation to\nfail with -EMFILE instead of triggering a kernel warning and avoids the\nimpractical \u003e8GB memory allocation request.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39756"
},
{
"cve": "CVE-2025-39757",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nALSA: usb-audio: Validate UAC3 cluster segment descriptors\r\n\r\nUAC3 class segment descriptors need to be verified whether their sizes\r\nmatch with the declared lengths and whether they fit with the\r\nallocated buffer sizes, too. Otherwise malicious firmware may lead to\r\nthe unexpected OOB accesses.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39757"
},
{
"cve": "CVE-2025-39759",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbtrfs: qgroup: fix race between quota disable and quota rescan ioctl\r\n\r\nThere\u0027s a race between a task disabling quotas and another running the\r\nrescan ioctl that can result in a use-after-free of qgroup records from\r\nthe fs_info-\u003eqgroup_tree rbtree.\r\n\r\nThis happens as follows:\r\n\r\n1) Task A enters btrfs_ioctl_quota_rescan() -\u003e btrfs_qgroup_rescan();\r\n\r\n2) Task B enters btrfs_quota_disable() and calls\r\n btrfs_qgroup_wait_for_completion(), which does nothing because at that\r\n point fs_info-\u003eqgroup_rescan_running is false (it wasn\u0027t set yet by\r\n task A);\r\n\r\n3) Task B calls btrfs_free_qgroup_config() which starts freeing qgroups\r\n from fs_info-\u003eqgroup_tree without taking the lock fs_info-\u003eqgroup_lock;\r\n\r\n4) Task A enters qgroup_rescan_zero_tracking() which starts iterating\r\n the fs_info-\u003eqgroup_tree tree while holding fs_info-\u003eqgroup_lock,\r\n but task B is freeing qgroup records from that tree without holding\r\n the lock, resulting in a use-after-free.\r\n\r\nFix this by taking fs_info-\u003eqgroup_lock at btrfs_free_qgroup_config().\r\nAlso at btrfs_qgroup_rescan() don\u0027t start the rescan worker if quotas\r\nwere already disabled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39759"
},
{
"cve": "CVE-2025-39760",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: core: config: Prevent OOB read in SS endpoint companion parsing\r\n\r\nusb_parse_ss_endpoint_companion() checks descriptor type before length,\r\nenabling a potentially odd read outside of the buffer size.\r\n\r\nFix this up by checking the size first before looking at any of the\r\nfields in the descriptor.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39760"
},
{
"cve": "CVE-2025-39766",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit\r\n\r\nThe following setup can trigger a WARNING in htb_activate due to\r\nthe condition: !cl-\u003eleaf.q-\u003eq.qlen\r\n\r\ntc qdisc del dev lo root\r\ntc qdisc add dev lo root handle 1: htb default 1\r\ntc class add dev lo parent 1: classid 1:1 \\\r\n htb rate 64bit\r\ntc qdisc add dev lo parent 1:1 handle f: \\\r\n cake memlimit 1b\r\nping -I lo -f -c1 -s64 -W0.001 127.0.0.1\r\n\r\nThis is because the low memlimit leads to a low buffer_limit, which\r\ncauses packet dropping. However, cake_enqueue still returns\r\nNET_XMIT_SUCCESS, causing htb_enqueue to call htb_activate with an\r\nempty child qdisc. We should return NET_XMIT_CN when packets are\r\ndropped from the same tin and flow.\r\n\r\nI do not believe return value of NET_XMIT_CN is necessary for packet\r\ndrops in the case of ack filtering, as that is meant to optimize\r\nperformance, not to signal congestion.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39766"
},
{
"cve": "CVE-2025-39770",
"cwe": {
"id": "CWE-573",
"name": "Improper Following of Specification by Caller"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM\n\nWhen performing Generic Segmentation Offload (GSO) on an IPv6 packet that\ncontains extension headers, the kernel incorrectly requests checksum offload\nif the egress device only advertises NETIF_F_IPV6_CSUM feature, which has\na strict contract: it supports checksum offload only for plain TCP or UDP\nover IPv6 and explicitly does not support packets with extension headers.\nThe current GSO logic violates this contract by failing to disable the feature\nfor packets with extension headers, such as those used in GREoIPv6 tunnels.\n\nThis violation results in the device being asked to perform an operation\nit cannot support, leading to a `skb_warn_bad_offload` warning and a collapse\nof network throughput. While device TSO/USO is correctly bypassed in favor\nof software GSO for these packets, the GSO stack must be explicitly told not\nto request checksum offload.\n\nMask NETIF_F_IPV6_CSUM, NETIF_F_TSO6 and NETIF_F_GSO_UDP_L4\nin gso_features_check if the IPv6 header contains extension headers to compute\nchecksum in software.\n\nThe exception is a BIG TCP extension, which, as stated in commit\n68e068cabd2c6c53 (\"net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets\"):\n\"The feature is only enabled on devices that support BIG TCP TSO.\nThe header is only present for PF_PACKET taps like tcpdump,\nand not transmitted by physical devices.\"\n\nkernel log output (truncated):\nWARNING: CPU: 1 PID: 5273 at net/core/dev.c:3535 skb_warn_bad_offload+0x81/0x140\n...\nCall Trace:\n \u003cTASK\u003e\n skb_checksum_help+0x12a/0x1f0\n validate_xmit_skb+0x1a3/0x2d0\n validate_xmit_skb_list+0x4f/0x80\n sch_direct_xmit+0x1a2/0x380\n __dev_xmit_skb+0x242/0x670\n __dev_queue_xmit+0x3fc/0x7f0\n ip6_finish_output2+0x25e/0x5d0\n ip6_finish_output+0x1fc/0x3f0\n ip6_tnl_xmit+0x608/0xc00 [ip6_tunnel]\n ip6gre_tunnel_xmit+0x1c0/0x390 [ip6_gre]\n dev_hard_start_xmit+0x63/0x1c0\n __dev_queue_xmit+0x6d0/0x7f0\n ip6_finish_output2+0x214/0x5d0\n ip6_finish_output+0x1fc/0x3f0\n ip6_xmit+0x2ca/0x6f0\n ip6_finish_output+0x1fc/0x3f0\n ip6_xmit+0x2ca/0x6f0\n inet6_csk_xmit+0xeb/0x150\n __tcp_transmit_skb+0x555/0xa80\n tcp_write_xmit+0x32a/0xe90\n tcp_sendmsg_locked+0x437/0x1110\n tcp_sendmsg+0x2f/0x50\n...\nskb linear: 00000000: e4 3d 1a 7d ec 30 e4 3d 1a 7e 5d 90 86 dd 60 0e\nskb linear: 00000010: 00 0a 1b 34 3c 40 20 11 00 00 00 00 00 00 00 00\nskb linear: 00000020: 00 00 00 00 00 12 20 11 00 00 00 00 00 00 00 00\nskb linear: 00000030: 00 00 00 00 00 11 2f 00 04 01 04 01 01 00 00 00\nskb linear: 00000040: 86 dd 60 0e 00 0a 1b 00 06 40 20 23 00 00 00 00\nskb linear: 00000050: 00 00 00 00 00 00 00 00 00 12 20 23 00 00 00 00\nskb linear: 00000060: 00 00 00 00 00 00 00 00 00 11 bf 96 14 51 13 f9\nskb linear: 00000070: ae 27 a0 a8 2b e3 80 18 00 40 5b 6f 00 00 01 01\nskb linear: 00000080: 08 0a 42 d4 50 d5 4b 70 f8 1a",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39770"
},
{
"cve": "CVE-2025-39772",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ndrm/hisilicon/hibmc: fix the hibmc loaded failed bug\r\n\r\nWhen hibmc loaded failed, the driver use hibmc_unload to free the\r\nresource, but the mutexes in mode.config are not init, which will\r\naccess an NULL pointer. Just change goto statement to return, because\r\nhibnc_hw_init() doesn\u0027t need to free anything.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39772"
},
{
"cve": "CVE-2025-39773",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: fix soft lockup in br_multicast_query_expired()\n\nWhen set multicast_query_interval to a large value, the local variable\n\u0027time\u0027 in br_multicast_send_query() may overflow. If the time is smaller\nthan jiffies, the timer will expire immediately, and then call mod_timer()\nagain, which creates a loop and may trigger the following soft lockup\nissue.\n\n watchdog: BUG: soft lockup - CPU#1 stuck for 221s! [rb_consumer:66]\n CPU: 1 UID: 0 PID: 66 Comm: rb_consumer Not tainted 6.16.0+ #259 PREEMPT(none)\n Call Trace:\n \u003cIRQ\u003e\n __netdev_alloc_skb+0x2e/0x3a0\n br_ip6_multicast_alloc_query+0x212/0x1b70\n __br_multicast_send_query+0x376/0xac0\n br_multicast_send_query+0x299/0x510\n br_multicast_query_expired.constprop.0+0x16d/0x1b0\n call_timer_fn+0x3b/0x2a0\n __run_timers+0x619/0x950\n run_timer_softirq+0x11c/0x220\n handle_softirqs+0x18e/0x560\n __irq_exit_rcu+0x158/0x1a0\n sysvec_apic_timer_interrupt+0x76/0x90\n \u003c/IRQ\u003e\n\nThis issue can be reproduced with:\n ip link add br0 type bridge\n echo 1 \u003e /sys/class/net/br0/bridge/multicast_querier\n echo 0xffffffffffffffff \u003e\n \t/sys/class/net/br0/bridge/multicast_query_interval\n ip link set dev br0 up\n\nThe multicast_startup_query_interval can also cause this issue. Similar to\nthe commit 99b40610956a (\"net: bridge: mcast: add and enforce query\ninterval minimum\"), add check for the query interval maximum to fix this\nissue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39773"
},
{
"cve": "CVE-2025-39776",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm/debug_vm_pgtable: clear page table entries at destroy_args()\r\n\r\nThe mm/debug_vm_pagetable test allocates manually page table entries for\r\nthe tests it runs, using also its manually allocated mm_struct. That in\r\nitself is ok, but when it exits, at destroy_args() it fails to clear those\r\nentries with the *_clear functions.\r\n\r\nThe problem is that leaves stale entries. If another process allocates an\r\nmm_struct with a pgd at the same address, it may end up running into the\r\nstale entry. This is happening in practice on a debug kernel with\r\nCONFIG_DEBUG_VM_PGTABLE=y, for example this is the output with some extra\r\ndebugging I added (it prints a warning trace if pgtables_bytes goes\r\nnegative, in addition to the warning at check_mm() function):\r\n\r\n[ 2.539353] debug_vm_pgtable: [get_random_vaddr ]: random_vaddr is 0x7ea247140000\r\n[ 2.539366] kmem_cache info\r\n[ 2.539374] kmem_cachep 0x000000002ce82385 - freelist 0x0000000000000000 - offset 0x508\r\n[ 2.539447] debug_vm_pgtable: [init_args ]: args-\u003emm is 0x000000002267cc9e\r\n(...)\r\n[ 2.552800] WARNING: CPU: 5 PID: 116 at include/linux/mm.h:2841 free_pud_range+0x8bc/0x8d0\r\n[ 2.552816] Modules linked in:\r\n[ 2.552843] CPU: 5 UID: 0 PID: 116 Comm: modprobe Not tainted 6.12.0-105.debug_vm2.el10.ppc64le+debug #1 VOLUNTARY\r\n[ 2.552859] Hardware name: IBM,9009-41A POWER9 (architected) 0x4e0202 0xf000005 of:IBM,FW910.00 (VL910_062) hv:phyp pSeries\r\n[ 2.552872] NIP: c0000000007eef3c LR: c0000000007eef30 CTR: c0000000003d8c90\r\n[ 2.552885] REGS: c0000000622e73b0 TRAP: 0700 Not tainted (6.12.0-105.debug_vm2.el10.ppc64le+debug)\r\n[ 2.552899] MSR: 800000000282b033 \u003cSF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE\u003e CR: 24002822 XER: 0000000a\r\n[ 2.552954] CFAR: c0000000008f03f0 IRQMASK: 0\r\n[ 2.552954] GPR00: c0000000007eef30 c0000000622e7650 c000000002b1ac00 0000000000000001\r\n[ 2.552954] GPR04: 0000000000000008 0000000000000000 c0000000007eef30 ffffffffffffffff\r\n[ 2.552954] GPR08: 00000000ffff00f5 0000000000000001 0000000000000048 0000000000004000\r\n[ 2.552954] GPR12: 00000003fa440000 c000000017ffa300 c0000000051d9f80 ffffffffffffffdb\r\n[ 2.552954] GPR16: 0000000000000000 0000000000000008 000000000000000a 60000000000000e0\r\n[ 2.552954] GPR20: 4080000000000000 c0000000113af038 00007fffcf130000 0000700000000000\r\n[ 2.552954] GPR24: c000000062a6a000 0000000000000001 8000000062a68000 0000000000000001\r\n[ 2.552954] GPR28: 000000000000000a c000000062ebc600 0000000000002000 c000000062ebc760\r\n[ 2.553170] NIP [c0000000007eef3c] free_pud_range+0x8bc/0x8d0\r\n[ 2.553185] LR [c0000000007eef30] free_pud_range+0x8b0/0x8d0\r\n[ 2.553199] Call Trace:\r\n[ 2.553207] [c0000000622e7650] [c0000000007eef30] free_pud_range+0x8b0/0x8d0 (unreliable)\r\n[ 2.553229] [c0000000622e7750] [c0000000007f40b4] free_pgd_range+0x284/0x3b0\r\n[ 2.553248] [c0000000622e7800] [c0000000007f4630] free_pgtables+0x450/0x570\r\n[ 2.553274] [c0000000622e78e0] [c0000000008161c0] exit_mmap+0x250/0x650\r\n[ 2.553292] [c0000000622e7a30] [c0000000001b95b8] __mmput+0x98/0x290\r\n[ 2.558344] [c0000000622e7a80] [c0000000001d1018] exit_mm+0x118/0x1b0\r\n[ 2.558361] [c0000000622e7ac0] [c0000000001d141c] do_exit+0x2ec/0x870\r\n[ 2.558376] [c0000000622e7b60] [c0000000001d1ca8] do_group_exit+0x88/0x150\r\n[ 2.558391] [c0000000622e7bb0] [c0000000001d1db8] sys_exit_group+0x48/0x50\r\n[ 2.558407] [c0000000622e7be0] [c00000000003d810] system_call_exception+0x1e0/0x4c0\r\n[ 2.558423] [c0000000622e7e50] [c00000000000d05c] system_call_vectored_common+0x15c/0x2ec\r\n(...)\r\n[ 2.558892] ---[ end trace 0000000000000000 ]---\r\n[ 2.559022] BUG: Bad rss-counter state mm:000000002267cc9e type:MM_ANONPAGES val:1\r\n[ 2.559037] BUG: non-zero pgtables_bytes on freeing mm: -6144\r\n\r\nHere the modprobe process ended up with an allocated mm_struct from the\r\nmm_struct slab that was used before by the debug_vm_pgtable test. That is\r\nnot a problem, since the mm_stru\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39776"
},
{
"cve": "CVE-2025-39782",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\njbd2: prevent softlockup in jbd2_log_do_checkpoint()\r\n\r\nBoth jbd2_log_do_checkpoint() and jbd2_journal_shrink_checkpoint_list()\r\nperiodically release j_list_lock after processing a batch of buffers to\r\navoid long hold times on the j_list_lock. However, since both functions\r\ncontend for j_list_lock, the combined time spent waiting and processing\r\ncan be significant.\r\n\r\njbd2_journal_shrink_checkpoint_list() explicitly calls cond_resched() when\r\nneed_resched() is true to avoid softlockups during prolonged operations.\r\nBut jbd2_log_do_checkpoint() only exits its loop when need_resched() is\r\ntrue, relying on potentially sleeping functions like __flush_batch() or\r\nwait_on_buffer() to trigger rescheduling. If those functions do not sleep,\r\nthe kernel may hit a softlockup.\r\n\r\nwatchdog: BUG: soft lockup - CPU#3 stuck for 156s! [kworker/u129:2:373]\r\nCPU: 3 PID: 373 Comm: kworker/u129:2 Kdump: loaded Not tainted 6.6.0+ #10\r\nHardware name: Huawei TaiShan 2280 /BC11SPCD, BIOS 1.27 06/13/2017\r\nWorkqueue: writeback wb_workfn (flush-7:2)\r\npstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\r\npc : native_queued_spin_lock_slowpath+0x358/0x418\r\nlr : jbd2_log_do_checkpoint+0x31c/0x438 [jbd2]\r\nCall trace:\r\n native_queued_spin_lock_slowpath+0x358/0x418\r\n jbd2_log_do_checkpoint+0x31c/0x438 [jbd2]\r\n __jbd2_log_wait_for_space+0xfc/0x2f8 [jbd2]\r\n add_transaction_credits+0x3bc/0x418 [jbd2]\r\n start_this_handle+0xf8/0x560 [jbd2]\r\n jbd2__journal_start+0x118/0x228 [jbd2]\r\n __ext4_journal_start_sb+0x110/0x188 [ext4]\r\n ext4_do_writepages+0x3dc/0x740 [ext4]\r\n ext4_writepages+0xa4/0x190 [ext4]\r\n do_writepages+0x94/0x228\r\n __writeback_single_inode+0x48/0x318\r\n writeback_sb_inodes+0x204/0x590\r\n __writeback_inodes_wb+0x54/0xf8\r\n wb_writeback+0x2cc/0x3d8\r\n wb_do_writeback+0x2e0/0x2f8\r\n wb_workfn+0x80/0x2a8\r\n process_one_work+0x178/0x3e8\r\n worker_thread+0x234/0x3b8\r\n kthread+0xf0/0x108\r\n ret_from_fork+0x10/0x20\r\n\r\nSo explicitly call cond_resched() in jbd2_log_do_checkpoint() to avoid\r\nsoftlockup.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39782"
},
{
"cve": "CVE-2025-39783",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: Fix configfs group list head handling\n\nDoing a list_del() on the epf_group field of struct pci_epf_driver in\npci_epf_remove_cfs() is not correct as this field is a list head, not\na list entry. This list_del() call triggers a KASAN warning when an\nendpoint function driver which has a configfs attribute group is torn\ndown:\n\n==================================================================\nBUG: KASAN: slab-use-after-free in pci_epf_remove_cfs+0x17c/0x198\nWrite of size 8 at addr ffff00010f4a0d80 by task rmmod/319\n\nCPU: 3 UID: 0 PID: 319 Comm: rmmod Not tainted 6.16.0-rc2 #1 NONE\nHardware name: Radxa ROCK 5B (DT)\nCall trace:\nshow_stack+0x2c/0x84 (C)\ndump_stack_lvl+0x70/0x98\nprint_report+0x17c/0x538\nkasan_report+0xb8/0x190\n__asan_report_store8_noabort+0x20/0x2c\npci_epf_remove_cfs+0x17c/0x198\npci_epf_unregister_driver+0x18/0x30\nnvmet_pci_epf_cleanup_module+0x24/0x30 [nvmet_pci_epf]\n__arm64_sys_delete_module+0x264/0x424\ninvoke_syscall+0x70/0x260\nel0_svc_common.constprop.0+0xac/0x230\ndo_el0_svc+0x40/0x58\nel0_svc+0x48/0xdc\nel0t_64_sync_handler+0x10c/0x138\nel0t_64_sync+0x198/0x19c\n...\n\nRemove this incorrect list_del() call from pci_epf_remove_cfs().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39783"
},
{
"cve": "CVE-2025-39787",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: mdt_loader: Ensure we don\u0027t read past the ELF header\n\nWhen the MDT loader is used in remoteproc, the ELF header is sanitized\nbeforehand, but that\u0027s not necessary the case for other clients.\n\nValidate the size of the firmware buffer to ensure that we don\u0027t read\npast the end as we iterate over the header. e_phentsize and e_shentsize\nare validated as well, to ensure that the assumptions about step size in\nthe traversal are valid.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39787"
},
{
"cve": "CVE-2025-39788",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nscsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE\r\n\r\nOn Google gs101, the number of UTP transfer request slots (nutrs) is 32,\r\nand in this case the driver ends up programming the UTRL_NEXUS_TYPE\r\nincorrectly as 0.\r\n\r\nThis is because the left hand side of the shift is 1, which is of type\r\nint, i.e. 31 bits wide. Shifting by more than that width results in\r\nundefined behaviour.\r\n\r\nFix this by switching to the BIT() macro, which applies correct type\r\ncasting as required. This ensures the correct value is written to\r\nUTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift\r\nwarning:\r\n\r\n UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21\r\n shift exponent 32 is too large for 32-bit type \u0027int\u0027\r\n\r\nFor consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE\r\nwrite.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39788"
},
{
"cve": "CVE-2025-39790",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbus: mhi: host: Detect events pointing to unexpected TREs\r\n\r\nWhen a remote device sends a completion event to the host, it contains a\r\npointer to the consumed TRE. The host uses this pointer to process all of\r\nthe TREs between it and the host\u0027s local copy of the ring\u0027s read pointer.\r\nThis works when processing completion for chained transactions, but can\r\nlead to nasty results if the device sends an event for a single-element\r\ntransaction with a read pointer that is multiple elements ahead of the\r\nhost\u0027s read pointer.\r\n\r\nFor instance, if the host accesses an event ring while the device is\r\nupdating it, the pointer inside of the event might still point to an old\r\nTRE. If the host uses the channel\u0027s xfer_cb() to directly free the buffer\r\npointed to by the TRE, the buffer will be double-freed.\r\n\r\nThis behavior was observed on an ep that used upstream EP stack without\r\n\u0027commit 6f18d174b73d (\"bus: mhi: ep: Update read pointer only after buffer\r\nis written\")\u0027. Where the device updated the events ring pointer before\r\nupdating the event contents, so it left a window where the host was able to\r\naccess the stale data the event pointed to, before the device had the\r\nchance to update them. The usual pattern was that the host received an\r\nevent pointing to a TRE that is not immediately after the last processed\r\none, so it got treated as if it was a chained transaction, processing all\r\nof the TREs in between the two read pointers.\r\n\r\nThis commit aims to harden the host by ensuring transactions where the\r\nevent points to a TRE that isn\u0027t local_rp + 1 are chained.\r\n\r\n[mani: added stable tag and reworded commit message]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39790"
},
{
"cve": "CVE-2025-39794",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nARM: tegra: Use I/O memcpy to write to IRAM\r\n\r\nKasan crashes the kernel trying to check boundaries when using the\r\nnormal memcpy.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39794"
},
{
"cve": "CVE-2025-39795",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: avoid possible overflow for chunk_sectors check in blk_stack_limits()\n\nIn blk_stack_limits(), we check that the t-\u003echunk_sectors value is a\nmultiple of the t-\u003ephysical_block_size value.\n\nHowever, by finding the chunk_sectors value in bytes, we may overflow\nthe unsigned int which holds chunk_sectors, so change the check to be\nbased on sectors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39795"
},
{
"cve": "CVE-2025-39798",
"cwe": {
"id": "CWE-273",
"name": "Improper Check for Dropped Privileges"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix the setting of capabilities when automounting a new filesystem\n\nCapabilities cannot be inherited when we cross into a new filesystem.\nThey need to be reset to the minimal defaults, and then probed for\nagain.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39798"
},
{
"cve": "CVE-2025-39800",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nbtrfs: abort transaction on unexpected eb generation at btrfs_copy_root()\r\n\r\nIf we find an unexpected generation for the extent buffer we are cloning\r\nat btrfs_copy_root(), we just WARN_ON() and don\u0027t error out and abort the\r\ntransaction, meaning we allow to persist metadata with an unexpected\r\ngeneration. Instead of warning only, abort the transaction and return\r\n-EUCLEAN.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39800"
},
{
"cve": "CVE-2025-39801",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nusb: dwc3: Remove WARN_ON for device endpoint command timeouts\r\n\r\nThis commit addresses a rarely observed endpoint command timeout\r\nwhich causes kernel panic due to warn when \u0027panic_on_warn\u0027 is enabled\r\nand unnecessary call trace prints when \u0027panic_on_warn\u0027 is disabled.\r\nIt is seen during fast software-controlled connect/disconnect testcases.\r\nThe following is one such endpoint command timeout that we observed:\r\n\r\n1. Connect\r\n =======\r\n-\u003edwc3_thread_interrupt\r\n -\u003edwc3_ep0_interrupt\r\n -\u003econfigfs_composite_setup\r\n -\u003ecomposite_setup\r\n -\u003eusb_ep_queue\r\n -\u003edwc3_gadget_ep0_queue\r\n -\u003e__dwc3_gadget_ep0_queue\r\n -\u003e__dwc3_ep0_do_control_data\r\n -\u003edwc3_send_gadget_ep_cmd\r\n\r\n2. Disconnect\r\n ==========\r\n-\u003edwc3_thread_interrupt\r\n -\u003edwc3_gadget_disconnect_interrupt\r\n -\u003edwc3_ep0_reset_state\r\n -\u003edwc3_ep0_end_control_data\r\n -\u003edwc3_send_gadget_ep_cmd\r\n\r\nIn the issue scenario, in Exynos platforms, we observed that control\r\ntransfers for the previous connect have not yet been completed and end\r\ntransfer command sent as a part of the disconnect sequence and\r\nprocessing of USB_ENDPOINT_HALT feature request from the host timeout.\r\nThis maybe an expected scenario since the controller is processing EP\r\ncommands sent as a part of the previous connect. It maybe better to\r\nremove WARN_ON in all places where device endpoint commands are sent to\r\navoid unnecessary kernel panic due to warn.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39801"
},
{
"cve": "CVE-2025-39806",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nHID: multitouch: fix slab out-of-bounds access in mt_report_fixup()\r\n\r\nA malicious HID device can trigger a slab out-of-bounds during\r\nmt_report_fixup() by passing in report descriptor smaller than\r\n607 bytes. mt_report_fixup() attempts to patch byte offset 607\r\nof the descriptor with 0x25 by first checking if byte offset\r\n607 is 0x15 however it lacks bounds checks to verify if the\r\ndescriptor is big enough before conducting this check. Fix\r\nthis bug by ensuring the descriptor size is at least 608\r\nbytes before accessing it.\r\n\r\nBelow is the KASAN splat after the out of bounds access happens:\r\n\r\n[ 13.671954] ==================================================================\r\n[ 13.672667] BUG: KASAN: slab-out-of-bounds in mt_report_fixup+0x103/0x110\r\n[ 13.673297] Read of size 1 at addr ffff888103df39df by task kworker/0:1/10\r\n[ 13.673297]\r\n[ 13.673297] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.15.0-00005-gec5d573d83f4-dirty #3\r\n[ 13.673297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/04\r\n[ 13.673297] Call Trace:\r\n[ 13.673297] \u003cTASK\u003e\r\n[ 13.673297] dump_stack_lvl+0x5f/0x80\r\n[ 13.673297] print_report+0xd1/0x660\r\n[ 13.673297] kasan_report+0xe5/0x120\r\n[ 13.673297] __asan_report_load1_noabort+0x18/0x20\r\n[ 13.673297] mt_report_fixup+0x103/0x110\r\n[ 13.673297] hid_open_report+0x1ef/0x810\r\n[ 13.673297] mt_probe+0x422/0x960\r\n[ 13.673297] hid_device_probe+0x2e2/0x6f0\r\n[ 13.673297] really_probe+0x1c6/0x6b0\r\n[ 13.673297] __driver_probe_device+0x24f/0x310\r\n[ 13.673297] driver_probe_device+0x4e/0x220\r\n[ 13.673297] __device_attach_driver+0x169/0x320\r\n[ 13.673297] bus_for_each_drv+0x11d/0x1b0\r\n[ 13.673297] __device_attach+0x1b8/0x3e0\r\n[ 13.673297] device_initial_probe+0x12/0x20\r\n[ 13.673297] bus_probe_device+0x13d/0x180\r\n[ 13.673297] device_add+0xe3a/0x1670\r\n[ 13.673297] hid_add_device+0x31d/0xa40\r\n[...]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39806"
},
{
"cve": "CVE-2025-39808",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nHID: hid-ntrig: fix unable to handle page fault in ntrig_report_version()\r\n\r\nin ntrig_report_version(), hdev parameter passed from hid_probe().\r\nsending descriptor to /dev/uhid can make hdev-\u003edev.parent-\u003eparent to null\r\nif hdev-\u003edev.parent-\u003eparent is null, usb_dev has\r\ninvalid address(0xffffffffffffff58) that hid_to_usb_dev(hdev) returned\r\nwhen usb_rcvctrlpipe() use usb_dev,it trigger\r\npage fault error for address(0xffffffffffffff58)\r\n\r\nadd null check logic to ntrig_report_version()\r\nbefore calling hid_to_usb_dev()",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39808"
},
{
"cve": "CVE-2025-39812",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsctp: initialize more fields in sctp_v6_from_sk()\r\n\r\nsyzbot found that sin6_scope_id was not properly initialized,\r\nleading to undefined behavior.\r\n\r\nClear sin6_scope_id and sin6_flowinfo.\r\n\r\nBUG: KMSAN: uninit-value in __sctp_v6_cmp_addr+0x887/0x8c0 net/sctp/ipv6.c:649\r\n __sctp_v6_cmp_addr+0x887/0x8c0 net/sctp/ipv6.c:649\r\n sctp_inet6_cmp_addr+0x4f2/0x510 net/sctp/ipv6.c:983\r\n sctp_bind_addr_conflict+0x22a/0x3b0 net/sctp/bind_addr.c:390\r\n sctp_get_port_local+0x21eb/0x2440 net/sctp/socket.c:8452\r\n sctp_get_port net/sctp/socket.c:8523 [inline]\r\n sctp_listen_start net/sctp/socket.c:8567 [inline]\r\n sctp_inet_listen+0x710/0xfd0 net/sctp/socket.c:8636\r\n __sys_listen_socket net/socket.c:1912 [inline]\r\n __sys_listen net/socket.c:1927 [inline]\r\n __do_sys_listen net/socket.c:1932 [inline]\r\n __se_sys_listen net/socket.c:1930 [inline]\r\n __x64_sys_listen+0x343/0x4c0 net/socket.c:1930\r\n x64_sys_call+0x271d/0x3e20 arch/x86/include/generated/asm/syscalls_64.h:51\r\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\r\n do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\n\r\nLocal variable addr.i.i created at:\r\n sctp_get_port net/sctp/socket.c:8515 [inline]\r\n sctp_listen_start net/sctp/socket.c:8567 [inline]\r\n sctp_inet_listen+0x650/0xfd0 net/sctp/socket.c:8636\r\n __sys_listen_socket net/socket.c:1912 [inline]\r\n __sys_listen net/socket.c:1927 [inline]\r\n __do_sys_listen net/socket.c:1932 [inline]\r\n __se_sys_listen net/socket.c:1930 [inline]\r\n __x64_sys_listen+0x343/0x4c0 net/socket.c:1930",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39812"
},
{
"cve": "CVE-2025-39813",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix potential warning in trace_printk_seq during ftrace_dump\n\nWhen calling ftrace_dump_one() concurrently with reading trace_pipe,\na WARN_ON_ONCE() in trace_printk_seq() can be triggered due to a race\ncondition.\n\nThe issue occurs because:\n\nCPU0 (ftrace_dump) CPU1 (reader)\necho z \u003e /proc/sysrq-trigger\n\n!trace_empty(\u0026iter)\ntrace_iterator_reset(\u0026iter) \u003c- len = size = 0\n cat /sys/kernel/tracing/trace_pipe\ntrace_find_next_entry_inc(\u0026iter)\n __find_next_entry\n ring_buffer_empty_cpu \u003c- all empty\n return NULL\n\ntrace_printk_seq(\u0026iter.seq)\n WARN_ON_ONCE(s-\u003eseq.len \u003e= s-\u003eseq.size)\n\nIn the context between trace_empty() and trace_find_next_entry_inc()\nduring ftrace_dump, the ring buffer data was consumed by other readers.\nThis caused trace_find_next_entry_inc to return NULL, failing to populate\n`iter.seq`. At this point, due to the prior trace_iterator_reset, both\n`iter.seq.len` and `iter.seq.size` were set to 0. Since they are equal,\nthe WARN_ON_ONCE condition is triggered.\n\nMove the trace_printk_seq() into the if block that checks to make sure the\nreturn value of trace_find_next_entry_inc() is non-NULL in\nftrace_dump_one(), ensuring the \u0027iter.seq\u0027 is properly populated before\nsubsequent operations.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39813"
},
{
"cve": "CVE-2025-39817",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nefivarfs: Fix slab-out-of-bounds in efivarfs_d_compare\r\n\r\nObserved on kernel 6.6 (present on master as well):\r\n\r\n BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0\r\n Call trace:\r\n kasan_check_range+0xe8/0x190\r\n __asan_loadN+0x1c/0x28\r\n memcmp+0x98/0xd0\r\n efivarfs_d_compare+0x68/0xd8\r\n __d_lookup_rcu_op_compare+0x178/0x218\r\n __d_lookup_rcu+0x1f8/0x228\r\n d_alloc_parallel+0x150/0x648\r\n lookup_open.isra.0+0x5f0/0x8d0\r\n open_last_lookups+0x264/0x828\r\n path_openat+0x130/0x3f8\r\n do_filp_open+0x114/0x248\r\n do_sys_openat2+0x340/0x3c0\r\n __arm64_sys_openat+0x120/0x1a0\r\n\r\nIf dentry-\u003ed_name.len \u003c EFI_VARIABLE_GUID_LEN , \u0027guid\u0027 can become\r\nnegative, leadings to oob. The issue can be triggered by parallel\r\nlookups using invalid filename:\r\n\r\n T1\t\t\tT2\r\n lookup_open\r\n -\u003elookup\r\n simple_lookup\r\n d_add\r\n // invalid dentry is added to hash list\r\n\r\n\t\t\tlookup_open\r\n\t\t\t d_alloc_parallel\r\n\t\t\t __d_lookup_rcu\r\n\t\t\t __d_lookup_rcu_op_compare\r\n\t\t\t hlist_bl_for_each_entry_rcu\r\n\t\t\t // invalid dentry can be retrieved\r\n\t\t\t -\u003ed_compare\r\n\t\t\t efivarfs_d_compare\r\n\t\t\t // oob\r\n\r\nFix it by checking \u0027guid\u0027 before cmp.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39817"
},
{
"cve": "CVE-2025-39819",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfs/smb: Fix inconsistent refcnt update\r\n\r\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\r\nSuch inconsistent update could lead to possible resource leaks.\r\n\r\nWhy it is a possible bug:\r\n1. In the comment section of the function, it clearly states that the\r\nreference to `cfile` should be dropped after calling this function.\r\n2. Every control flow path would check and drop the reference to\r\n`cfile`, except the patched one.\r\n3. Existing callers would not handle refcount update of `cfile` if\r\n-ENOMEM is returned.\r\n\r\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\r\ncleanup logic would always be respected. As the problem is caused by the\r\nallocation failure of `vars`, the cleanup logic between label \"finished\"\r\nand \"out\" can be safely ignored. According to the definition of function\r\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\r\nTherefore, the replay logic also gets ignored.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39823",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nKVM: x86: use array_index_nospec with indices that come from guest\r\n\r\nmin and dest_id are guest-controlled indices. Using array_index_nospec()\r\nafter the bounds checks clamps these values to mitigate speculative execution\r\nside-channels.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39823"
},
{
"cve": "CVE-2025-39824",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nHID: asus: fix UAF via HID_CLAIMED_INPUT validation\r\n\r\nAfter hid_hw_start() is called hidinput_connect() will eventually be\r\ncalled to set up the device with the input layer since the\r\nHID_CONNECT_DEFAULT connect mask is used. During hidinput_connect()\r\nall input and output reports are processed and corresponding hid_inputs\r\nare allocated and configured via hidinput_configure_usages(). This\r\nprocess involves slot tagging report fields and configuring usages\r\nby setting relevant bits in the capability bitmaps. However it is possible\r\nthat the capability bitmaps are not set at all leading to the subsequent\r\nhidinput_has_been_populated() check to fail leading to the freeing of the\r\nhid_input and the underlying input device.\r\n\r\nThis becomes problematic because a malicious HID device like a\r\nASUS ROG N-Key keyboard can trigger the above scenario via a\r\nspecially crafted descriptor which then leads to a user-after-free\r\nwhen the name of the freed input device is written to later on after\r\nhid_hw_start(). Below, report 93 intentionally utilises the\r\nHID_UP_UNDEFINED Usage Page which is skipped during usage\r\nconfiguration, leading to the frees.\r\n\r\n0x05, 0x0D, // Usage Page (Digitizer)\r\n0x09, 0x05, // Usage (Touch Pad)\r\n0xA1, 0x01, // Collection (Application)\r\n0x85, 0x0D, // Report ID (13)\r\n0x06, 0x00, 0xFF, // Usage Page (Vendor Defined 0xFF00)\r\n0x09, 0xC5, // Usage (0xC5)\r\n0x15, 0x00, // Logical Minimum (0)\r\n0x26, 0xFF, 0x00, // Logical Maximum (255)\r\n0x75, 0x08, // Report Size (8)\r\n0x95, 0x04, // Report Count (4)\r\n0xB1, 0x02, // Feature (Data,Var,Abs)\r\n0x85, 0x5D, // Report ID (93)\r\n0x06, 0x00, 0x00, // Usage Page (Undefined)\r\n0x09, 0x01, // Usage (0x01)\r\n0x15, 0x00, // Logical Minimum (0)\r\n0x26, 0xFF, 0x00, // Logical Maximum (255)\r\n0x75, 0x08, // Report Size (8)\r\n0x95, 0x1B, // Report Count (27)\r\n0x81, 0x02, // Input (Data,Var,Abs)\r\n0xC0, // End Collection\r\n\r\nBelow is the KASAN splat after triggering the UAF:\r\n\r\n[ 21.672709] ==================================================================\r\n[ 21.673700] BUG: KASAN: slab-use-after-free in asus_probe+0xeeb/0xf80\r\n[ 21.673700] Write of size 8 at addr ffff88810a0ac000 by task kworker/1:2/54\r\n[ 21.673700]\r\n[ 21.673700] CPU: 1 UID: 0 PID: 54 Comm: kworker/1:2 Not tainted 6.16.0-rc4-g9773391cf4dd-dirty #36 PREEMPT(voluntary)\r\n[ 21.673700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\r\n[ 21.673700] Call Trace:\r\n[ 21.673700] \u003cTASK\u003e\r\n[ 21.673700] dump_stack_lvl+0x5f/0x80\r\n[ 21.673700] print_report+0xd1/0x660\r\n[ 21.673700] kasan_report+0xe5/0x120\r\n[ 21.673700] __asan_report_store8_noabort+0x1b/0x30\r\n[ 21.673700] asus_probe+0xeeb/0xf80\r\n[ 21.673700] hid_device_probe+0x2ee/0x700\r\n[ 21.673700] really_probe+0x1c6/0x6b0\r\n[ 21.673700] __driver_probe_device+0x24f/0x310\r\n[ 21.673700] driver_probe_device+0x4e/0x220\r\n[...]\r\n[ 21.673700]\r\n[ 21.673700] Allocated by task 54:\r\n[ 21.673700] kasan_save_stack+0x3d/0x60\r\n[ 21.673700] kasan_save_track+0x18/0x40\r\n[ 21.673700] kasan_save_alloc_info+0x3b/0x50\r\n[ 21.673700] __kasan_kmalloc+0x9c/0xa0\r\n[ 21.673700] __kmalloc_cache_noprof+0x139/0x340\r\n[ 21.673700] input_allocate_device+0x44/0x370\r\n[ 21.673700] hidinput_connect+0xcb6/0x2630\r\n[ 21.673700] hid_connect+0xf74/0x1d60\r\n[ 21.673700] hid_hw_start+0x8c/0x110\r\n[ 21.673700] asus_probe+0x5a3/0xf80\r\n[ 21.673700] hid_device_probe+0x2ee/0x700\r\n[ 21.673700] really_probe+0x1c6/0x6b0\r\n[ 21.673700] __driver_probe_device+0x24f/0x310\r\n[ 21.673700] driver_probe_device+0x4e/0x220\r\n[...]\r\n[ 21.673700]\r\n[ 21.673700] Freed by task 54:\r\n[ 21.673700] kasan_save_stack+0x3d/0x60\r\n[ 21.673700] kasan_save_track+0x18/0x40\r\n[ 21.673700] kasan_save_free_info+0x3f/0x60\r\n[ 21.673700] __kasan_slab_free+0x3c/0x50\r\n[ 21.673700] kfre\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39824"
},
{
"cve": "CVE-2025-39825",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nsmb: client: fix race with concurrent opens in rename(2)\r\n\r\nBesides sending the rename request to the server, the rename process\r\nalso involves closing any deferred close, waiting for outstanding I/O\r\nto complete as well as marking all existing open handles as deleted to\r\nprevent them from deferring closes, which increases the race window\r\nfor potential concurrent opens on the target file.\r\n\r\nFix this by unhashing the dentry in advance to prevent any concurrent\r\nopens on the target.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39825"
},
{
"cve": "CVE-2025-39826",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: rose: convert \u0027use\u0027 field to refcount_t\r\n\r\nThe \u0027use\u0027 field in struct rose_neigh is used as a reference counter but\r\nlacks atomicity. This can lead to race conditions where a rose_neigh\r\nstructure is freed while still being referenced by other code paths.\r\n\r\nFor example, when rose_neigh-\u003euse becomes zero during an ioctl operation\r\nvia rose_rt_ioctl(), the structure may be removed while its timer is\r\nstill active, potentially causing use-after-free issues.\r\n\r\nThis patch changes the type of \u0027use\u0027 from unsigned short to refcount_t and\r\nupdates all code paths to use rose_neigh_hold() and rose_neigh_put() which\r\noperate reference counts atomically.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39826"
},
{
"cve": "CVE-2025-39827",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet: rose: include node references in rose_neigh refcount\r\n\r\nCurrent implementation maintains two separate reference counting\r\nmechanisms: the \u0027count\u0027 field in struct rose_neigh tracks references from\r\nrose_node structures, while the \u0027use\u0027 field (now refcount_t) tracks\r\nreferences from rose_sock.\r\n\r\nThis patch merges these two reference counting systems using \u0027use\u0027 field\r\nfor proper reference management. Specifically, this patch adds incrementing\r\nand decrementing of rose_neigh-\u003euse when rose_neigh-\u003ecount is incremented\r\nor decremented.\r\n\r\nThis patch also modifies rose_rt_free(), rose_rt_device_down() and\r\nrose_clear_route() to properly release references to rose_neigh objects\r\nbefore freeing a rose_node through rose_remove_node().\r\n\r\nThese changes ensure rose_neigh structures are properly freed only when\r\nall references, including those from rose_node structures, are released.\r\nAs a result, this resolves a slab-use-after-free issue reported by Syzbot.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39827"
},
{
"cve": "CVE-2025-39828",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\natm: atmtcp: Prevent arbitrary write in atmtcp_recv_control().\r\n\r\nsyzbot reported the splat below. [0]\r\n\r\nWhen atmtcp_v_open() or atmtcp_v_close() is called via connect()\r\nor close(), atmtcp_send_control() is called to send an in-kernel\r\nspecial message.\r\n\r\nThe message has ATMTCP_HDR_MAGIC in atmtcp_control.hdr.length.\r\nAlso, a pointer of struct atm_vcc is set to atmtcp_control.vcc.\r\n\r\nThe notable thing is struct atmtcp_control is uAPI but has a\r\nspace for an in-kernel pointer.\r\n\r\n struct atmtcp_control {\r\n \tstruct atmtcp_hdr hdr;\t/* must be first */\r\n ...\r\n \tatm_kptr_t vcc;\t\t/* both directions */\r\n ...\r\n } __ATM_API_ALIGN;\r\n\r\n typedef struct { unsigned char _[8]; } __ATM_API_ALIGN atm_kptr_t;\r\n\r\nThe special message is processed in atmtcp_recv_control() called\r\nfrom atmtcp_c_send().\r\n\r\natmtcp_c_send() is vcc-\u003edev-\u003eops-\u003esend() and called from 2 paths:\r\n\r\n 1. .ndo_start_xmit() (vcc-\u003esend() == atm_send_aal0())\r\n 2. vcc_sendmsg()\r\n\r\nThe problem is sendmsg() does not validate the message length and\r\nuserspace can abuse atmtcp_recv_control() to overwrite any kptr\r\nby atmtcp_control.\r\n\r\nLet\u0027s add a new -\u003epre_send() hook to validate messages from sendmsg().\r\n\r\n[0]:\r\nOops: general protection fault, probably for non-canonical address 0xdffffc00200000ab: 0000 [#1] SMP KASAN PTI\r\nKASAN: probably user-memory-access in range [0x0000000100000558-0x000000010000055f]\r\nCPU: 0 UID: 0 PID: 5865 Comm: syz-executor331 Not tainted 6.17.0-rc1-syzkaller-00215-gbab3ce404553 #0 PREEMPT(full)\r\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\r\nRIP: 0010:atmtcp_recv_control drivers/atm/atmtcp.c:93 [inline]\r\nRIP: 0010:atmtcp_c_send+0x1da/0x950 drivers/atm/atmtcp.c:297\r\nCode: 4d 8d 75 1a 4c 89 f0 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 15 06 00 00 41 0f b7 1e 4d 8d b7 60 05 00 00 4c 89 f0 48 c1 e8 03 \u003c42\u003e 0f b6 04 20 84 c0 0f 85 13 06 00 00 66 41 89 1e 4d 8d 75 1c 4c\r\nRSP: 0018:ffffc90003f5f810 EFLAGS: 00010203\r\nRAX: 00000000200000ab RBX: 0000000000000000 RCX: 0000000000000000\r\nRDX: ffff88802a510000 RSI: 00000000ffffffff RDI: ffff888030a6068c\r\nRBP: ffff88802699fb40 R08: ffff888030a606eb R09: 1ffff1100614c0dd\r\nR10: dffffc0000000000 R11: ffffffff8718fc40 R12: dffffc0000000000\r\nR13: ffff888030a60680 R14: 000000010000055f R15: 00000000ffffffff\r\nFS: 00007f8d7e9236c0(0000) GS:ffff888125c1c000(0000) knlGS:0000000000000000\r\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\r\nCR2: 000000000045ad50 CR3: 0000000075bde000 CR4: 00000000003526f0\r\nCall Trace:\r\n \u003cTASK\u003e\r\n vcc_sendmsg+0xa10/0xc60 net/atm/common.c:645\r\n sock_sendmsg_nosec net/socket.c:714 [inline]\r\n __sock_sendmsg+0x219/0x270 net/socket.c:729\r\n ____sys_sendmsg+0x505/0x830 net/socket.c:2614\r\n ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2668\r\n __sys_sendmsg net/socket.c:2700 [inline]\r\n __do_sys_sendmsg net/socket.c:2705 [inline]\r\n __se_sys_sendmsg net/socket.c:2703 [inline]\r\n __x64_sys_sendmsg+0x19b/0x260 net/socket.c:2703\r\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\r\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\r\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\r\nRIP: 0033:0x7f8d7e96a4a9\r\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\r\nRSP: 002b:00007f8d7e923198 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\r\nRAX: ffffffffffffffda RBX: 00007f8d7e9f4308 RCX: 00007f8d7e96a4a9\r\nRDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000005\r\nRBP: 00007f8d7e9f4300 R08: 65732f636f72702f R09: 65732f636f72702f\r\nR10: 65732f636f72702f R11: 0000000000000246 R12: 00007f8d7e9c10ac\r\nR13: 00007f8d7e9231a0 R14: 0000200000000200 R15: 0000200000000250\r\n \u003c/TASK\u003e\r\nModules linked in:",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39828"
},
{
"cve": "CVE-2025-39835",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: do not propagate ENODATA disk errors into xattr code\n\nENODATA (aka ENOATTR) has a very specific meaning in the xfs xattr code;\nnamely, that the requested attribute name could not be found.\n\nHowever, a medium error from disk may also return ENODATA. At best,\nthis medium error may escape to userspace as \"attribute not found\"\nwhen in fact it\u0027s an IO (disk) error.\n\nAt worst, we may oops in xfs_attr_leaf_get() when we do:\n\n\terror = xfs_attr_leaf_hasname(args, \u0026bp);\n\tif (error == -ENOATTR) {\n\t\txfs_trans_brelse(args-\u003etrans, bp);\n\t\treturn error;\n\t}\n\nbecause an ENODATA/ENOATTR error from disk leaves us with a null bp,\nand the xfs_trans_brelse will then null-deref it.\n\nAs discussed on the list, we really need to modify the lower level\nIO functions to trap all disk errors and ensure that we don\u0027t let\nunique errors like this leak up into higher xfs functions - many\nlike this should be remapped to EIO.\n\nHowever, this patch directly addresses a reported bug in the xattr\ncode, and should be safe to backport to stable kernels. A larger-scope\npatch to handle more unique errors at lower levels can follow later.\n\n(Note, prior to 07120f1abdff we did not oops, but we did return the\nwrong error code to userspace.)",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39835"
},
{
"cve": "CVE-2025-39838",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ncifs: prevent NULL pointer dereference in UTF16 conversion\r\n\r\nThere can be a NULL pointer dereference bug here. NULL is passed to\r\n__cifs_sfu_make_node without checks, which passes it unchecked to\r\ncifs_strndup_to_utf16, which in turn passes it to\r\ncifs_local_to_utf16_bytes where \u0027*from\u0027 is dereferenced, causing a crash.\r\n\r\nThis patch adds a check for NULL \u0027src\u0027 in cifs_strndup_to_utf16 and\r\nreturns NULL early to prevent dereferencing NULL pointer.\r\n\r\nFound by Linux Verification Center (linuxtesting.org) with SVACE",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39838"
},
{
"cve": "CVE-2025-39839",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: fix OOB read/write in network-coding decode\n\nbatadv_nc_skb_decode_packet() trusts coded_len and checks only against\nskb-\u003elen. XOR starts at sizeof(struct batadv_unicast_packet), reducing\npayload headroom, and the source skb length is not verified, allowing an\nout-of-bounds read and a small out-of-bounds write.\n\nValidate that coded_len fits within the payload area of both destination\nand source sk_buffs before XORing.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39839"
},
{
"cve": "CVE-2025-39841",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix buffer free/clear order in deferred receive path\n\nFix a use-after-free window by correcting the buffer release sequence in\nthe deferred receive path. The code freed the RQ buffer first and only\nthen cleared the context pointer under the lock. Concurrent paths (e.g.,\nABTS and the repost path) also inspect and release the same pointer under\nthe lock, so the old order could lead to double-free/UAF.\n\nNote that the repost path already uses the correct pattern: detach the\npointer under the lock, then free it after dropping the lock. The\ndeferred path should do the same.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39841"
},
{
"cve": "CVE-2025-39842",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nocfs2: prevent release journal inode after journal shutdown\r\n\r\nBefore calling ocfs2_delete_osb(), ocfs2_journal_shutdown() has already\r\nbeen executed in ocfs2_dismount_volume(), so osb-\u003ejournal must be NULL. \r\nTherefore, the following calltrace will inevitably fail when it reaches\r\njbd2_journal_release_jbd_inode().\r\n\r\nocfs2_dismount_volume()-\u003e\r\n ocfs2_delete_osb()-\u003e\r\n ocfs2_free_slot_info()-\u003e\r\n __ocfs2_free_slot_info()-\u003e\r\n evict()-\u003e\r\n ocfs2_evict_inode()-\u003e\r\n ocfs2_clear_inode()-\u003e\r\n\t jbd2_journal_release_jbd_inode(osb-\u003ejournal-\u003ej_journal,\r\n\r\nAdding osb-\u003ejournal checks will prevent null-ptr-deref during the above\r\nexecution path.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39842"
},
{
"cve": "CVE-2025-39843",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm: slub: avoid wake up kswapd in set_track_prepare\r\n\r\nset_track_prepare() can incur lock recursion.\r\nThe issue is that it is called from hrtimer_start_range_ns\r\nholding the per_cpu(hrtimer_bases)[n].lock, but when enabled\r\nCONFIG_DEBUG_OBJECTS_TIMERS, may wake up kswapd in set_track_prepare,\r\nand try to hold the per_cpu(hrtimer_bases)[n].lock.\r\n\r\nAvoid deadlock caused by implicitly waking up kswapd by passing in\r\nallocation flags, which do not contain __GFP_KSWAPD_RECLAIM in the\r\ndebug_objects_fill_pool() case. Inside stack depot they are processed by\r\ngfp_nested_mask().\r\nSince ___slab_alloc() has preemption disabled, we mask out\r\n__GFP_DIRECT_RECLAIM from the flags there.\r\n\r\nThe oops looks something like:\r\n\r\nBUG: spinlock recursion on CPU#3, swapper/3/0\r\n lock: 0xffffff8a4bf29c80, .magic: dead4ead, .owner: swapper/3/0, .owner_cpu: 3\r\nHardware name: Qualcomm Technologies, Inc. Popsicle based on SM8850 (DT)\r\nCall trace:\r\nspin_bug+0x0\r\n_raw_spin_lock_irqsave+0x80\r\nhrtimer_try_to_cancel+0x94\r\ntask_contending+0x10c\r\nenqueue_dl_entity+0x2a4\r\ndl_server_start+0x74\r\nenqueue_task_fair+0x568\r\nenqueue_task+0xac\r\ndo_activate_task+0x14c\r\nttwu_do_activate+0xcc\r\ntry_to_wake_up+0x6c8\r\ndefault_wake_function+0x20\r\nautoremove_wake_function+0x1c\r\n__wake_up+0xac\r\nwakeup_kswapd+0x19c\r\nwake_all_kswapds+0x78\r\n__alloc_pages_slowpath+0x1ac\r\n__alloc_pages_noprof+0x298\r\nstack_depot_save_flags+0x6b0\r\nstack_depot_save+0x14\r\nset_track_prepare+0x5c\r\n___slab_alloc+0xccc\r\n__kmalloc_cache_noprof+0x470\r\n__set_page_owner+0x2bc\r\npost_alloc_hook[jt]+0x1b8\r\nprep_new_page+0x28\r\nget_page_from_freelist+0x1edc\r\n__alloc_pages_noprof+0x13c\r\nalloc_slab_page+0x244\r\nallocate_slab+0x7c\r\n___slab_alloc+0x8e8\r\nkmem_cache_alloc_noprof+0x450\r\ndebug_objects_fill_pool+0x22c\r\ndebug_object_activate+0x40\r\nenqueue_hrtimer[jt]+0xdc\r\nhrtimer_start_range_ns+0x5f8\r\n...",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39843"
},
{
"cve": "CVE-2025-39844",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nmm: move page table sync declarations to linux/pgtable.h\r\n\r\nDuring our internal testing, we started observing intermittent boot\r\nfailures when the machine uses 4-level paging and has a large amount of\r\npersistent memory:\r\n\r\n BUG: unable to handle page fault for address: ffffe70000000034\r\n #PF: supervisor write access in kernel mode\r\n #PF: error_code(0x0002) - not-present page\r\n PGD 0 P4D 0 \r\n Oops: 0002 [#1] SMP NOPTI\r\n RIP: 0010:__init_single_page+0x9/0x6d\r\n Call Trace:\r\n \u003cTASK\u003e\r\n __init_zone_device_page+0x17/0x5d\r\n memmap_init_zone_device+0x154/0x1bb\r\n pagemap_range+0x2e0/0x40f\r\n memremap_pages+0x10b/0x2f0\r\n devm_memremap_pages+0x1e/0x60\r\n dev_dax_probe+0xce/0x2ec [device_dax]\r\n dax_bus_probe+0x6d/0xc9\r\n [... snip ...]\r\n \u003c/TASK\u003e\r\n\r\nIt turns out that the kernel panics while initializing vmemmap (struct\r\npage array) when the vmemmap region spans two PGD entries, because the new\r\nPGD entry is only installed in init_mm.pgd, but not in the page tables of\r\nother tasks.\r\n\r\nAnd looking at __populate_section_memmap():\r\n if (vmemmap_can_optimize(altmap, pgmap)) \r\n // does not sync top level page tables\r\n r = vmemmap_populate_compound_pages(pfn, start, end, nid, pgmap);\r\n else \r\n // sync top level page tables in x86\r\n r = vmemmap_populate(start, end, nid, altmap);\r\n\r\nIn the normal path, vmemmap_populate() in arch/x86/mm/init_64.c\r\nsynchronizes the top level page table (See commit 9b861528a801 (\"x86-64,\r\nmem: Update all PGDs for direct mapping and vmemmap mapping changes\")) so\r\nthat all tasks in the system can see the new vmemmap area.\r\n\r\nHowever, when vmemmap_can_optimize() returns true, the optimized path\r\nskips synchronization of top-level page tables. This is because\r\nvmemmap_populate_compound_pages() is implemented in core MM code, which\r\ndoes not handle synchronization of the top-level page tables. Instead,\r\nthe core MM has historically relied on each architecture to perform this\r\nsynchronization manually.\r\n\r\nWe\u0027re not the first party to encounter a crash caused by not-sync\u0027d top\r\nlevel page tables: earlier this year, Gwan-gyeong Mun attempted to address\r\nthe issue [1] [2] after hitting a kernel panic when x86 code accessed the\r\nvmemmap area before the corresponding top-level entries were synced. At\r\nthat time, the issue was believed to be triggered only when struct page\r\nwas enlarged for debugging purposes, and the patch did not get further\r\nupdates.\r\n\r\nIt turns out that current approach of relying on each arch to handle the\r\npage table sync manually is fragile because 1) it\u0027s easy to forget to sync\r\nthe top level page table, and 2) it\u0027s also easy to overlook that the\r\nkernel should not access the vmemmap and direct mapping areas before the\r\nsync.\r\n\r\n# The solution: Make page table sync more code robust and harder to miss\r\n\r\nTo address this, Dave Hansen suggested [3] [4] introducing\r\n{pgd,p4d}_populate_kernel() for updating kernel portion of the page tables\r\nand allow each architecture to explicitly perform synchronization when\r\ninstalling top-level entries. With this approach, we no longer need to\r\nworry about missing the sync step, reducing the risk of future\r\nregressions.\r\n\r\nThe new interface reuses existing ARCH_PAGE_TABLE_SYNC_MASK,\r\nPGTBL_P*D_MODIFIED and arch_sync_kernel_mappings() facility used by\r\nvmalloc and ioremap to synchronize page tables.\r\n\r\npgd_populate_kernel() looks like this:\r\nstatic inline void pgd_populate_kernel(unsigned long addr, pgd_t *pgd,\r\n p4d_t *p4d)\r\n{\r\n pgd_populate(\u0026init_mm, pgd, p4d);\r\n if (ARCH_PAGE_TABLE_SYNC_MASK \u0026 PGTBL_PGD_MODIFIED)\r\n arch_sync_kernel_mappings(addr, addr);\r\n}\r\n\r\nIt is worth noting that vmalloc() and apply_to_range() carefully\r\nsynchronizes page tables by calling p*d_alloc_track() and\r\narch_sync_kernel_mappings(), and thus they are not affected by\r\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39844"
},
{
"cve": "CVE-2025-39845",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nx86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings()\r\n\r\nDefine ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() to ensure\r\npage tables are properly synchronized when calling p*d_populate_kernel().\r\n\r\nFor 5-level paging, synchronization is performed via\r\npgd_populate_kernel(). In 4-level paging, pgd_populate() is a no-op, so\r\nsynchronization is instead performed at the P4D level via\r\np4d_populate_kernel().\r\n\r\nThis fixes intermittent boot failures on systems using 4-level paging and\r\na large amount of persistent memory:\r\n\r\n BUG: unable to handle page fault for address: ffffe70000000034\r\n #PF: supervisor write access in kernel mode\r\n #PF: error_code(0x0002) - not-present page\r\n PGD 0 P4D 0\r\n Oops: 0002 [#1] SMP NOPTI\r\n RIP: 0010:__init_single_page+0x9/0x6d\r\n Call Trace:\r\n \u003cTASK\u003e\r\n __init_zone_device_page+0x17/0x5d\r\n memmap_init_zone_device+0x154/0x1bb\r\n pagemap_range+0x2e0/0x40f\r\n memremap_pages+0x10b/0x2f0\r\n devm_memremap_pages+0x1e/0x60\r\n dev_dax_probe+0xce/0x2ec [device_dax]\r\n dax_bus_probe+0x6d/0xc9\r\n [... snip ...]\r\n \u003c/TASK\u003e\r\n\r\nIt also fixes a crash in vmemmap_set_pmd() caused by accessing vmemmap\r\nbefore sync_global_pgds() [1]:\r\n\r\n BUG: unable to handle page fault for address: ffffeb3ff1200000\r\n #PF: supervisor write access in kernel mode\r\n #PF: error_code(0x0002) - not-present page\r\n PGD 0 P4D 0\r\n Oops: Oops: 0002 [#1] PREEMPT SMP NOPTI\r\n Tainted: [W]=WARN\r\n RIP: 0010:vmemmap_set_pmd+0xff/0x230\r\n \u003cTASK\u003e\r\n vmemmap_populate_hugepages+0x176/0x180\r\n vmemmap_populate+0x34/0x80\r\n __populate_section_memmap+0x41/0x90\r\n sparse_add_section+0x121/0x3e0\r\n __add_pages+0xba/0x150\r\n add_pages+0x1d/0x70\r\n memremap_pages+0x3dc/0x810\r\n devm_memremap_pages+0x1c/0x60\r\n xe_devm_add+0x8b/0x100 [xe]\r\n xe_tile_init_noalloc+0x6a/0x70 [xe]\r\n xe_device_probe+0x48c/0x740 [xe]\r\n [... snip ...]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39845"
},
{
"cve": "CVE-2025-39846",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region()\n\nIn __iodyn_find_io_region(), pcmcia_make_resource() is assigned to\nres and used in pci_bus_alloc_resource(). There is a dereference of res\nin pci_bus_alloc_resource(), which could lead to a NULL pointer\ndereference on failure of pcmcia_make_resource().\n\nFix this bug by adding a check of res.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39846"
},
{
"cve": "CVE-2025-39847",
"cwe": {
"id": "CWE-772",
"name": "Missing Release of Resource after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nppp: fix memory leak in pad_compress_skb\r\n\r\nIf alloc_skb() fails in pad_compress_skb(), it returns NULL without\r\nreleasing the old skb. The caller does:\r\n\r\n skb = pad_compress_skb(ppp, skb);\r\n if (!skb)\r\n goto drop;\r\n\r\ndrop:\r\n kfree_skb(skb);\r\n\r\nWhen pad_compress_skb() returns NULL, the reference to the old skb is\r\nlost and kfree_skb(skb) ends up doing nothing, leading to a memory leak.\r\n\r\nAlign pad_compress_skb() semantics with realloc(): only free the old\r\nskb if allocation and compression succeed. At the call site, use the\r\nnew_skb variable so the original skb is not lost when pad_compress_skb()\r\nfails.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39847"
},
{
"cve": "CVE-2025-39848",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nax25: properly unshare skbs in ax25_kiss_rcv()\r\n\r\nBernard Pidoux reported a regression apparently caused by commit\r\nc353e8983e0d (\"net: introduce per netns packet chains\").\r\n\r\nskb-\u003edev becomes NULL and we crash in __netif_receive_skb_core().\r\n\r\nBefore above commit, different kind of bugs or corruptions could happen\r\nwithout a major crash.\r\n\r\nBut the root cause is that ax25_kiss_rcv() can queue/mangle input skb\r\nwithout checking if this skb is shared or not.\r\n\r\nMany thanks to Bernard Pidoux for his help, diagnosis and tests.\r\n\r\nWe had a similar issue years ago fixed with commit 7aaed57c5c28\r\n(\"phonet: properly unshare skbs in phonet_rcv()\").",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39848"
},
{
"cve": "CVE-2025-39849",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nwifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()\r\n\r\nIf the ssid-\u003edatalen is more than IEEE80211_MAX_SSID_LEN (32) it would\r\nlead to memory corruption so add some bounds checking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39849"
},
{
"cve": "CVE-2025-39853",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix potential invalid access when MAC list is empty\n\nlist_first_entry() never returns NULL - if the list is empty, it still\nreturns a pointer to an invalid object, leading to potential invalid\nmemory access when dereferenced.\n\nFix this by using list_first_entry_or_null instead of list_first_entry.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39853"
},
{
"cve": "CVE-2025-39857",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnet/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync()\r\n\r\nBUG: kernel NULL pointer dereference, address: 00000000000002ec\r\nPGD 0 P4D 0\r\nOops: Oops: 0000 [#1] SMP PTI\r\nCPU: 28 UID: 0 PID: 343 Comm: kworker/28:1 Kdump: loaded Tainted: G OE 6.17.0-rc2+ #9 NONE\r\nTainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\r\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\r\nWorkqueue: smc_hs_wq smc_listen_work [smc]\r\nRIP: 0010:smc_ib_is_sg_need_sync+0x9e/0xd0 [smc]\r\n...\r\nCall Trace:\r\n \u003cTASK\u003e\r\n smcr_buf_map_link+0x211/0x2a0 [smc]\r\n __smc_buf_create+0x522/0x970 [smc]\r\n smc_buf_create+0x3a/0x110 [smc]\r\n smc_find_rdma_v2_device_serv+0x18f/0x240 [smc]\r\n ? smc_vlan_by_tcpsk+0x7e/0xe0 [smc]\r\n smc_listen_find_device+0x1dd/0x2b0 [smc]\r\n smc_listen_work+0x30f/0x580 [smc]\r\n process_one_work+0x18c/0x340\r\n worker_thread+0x242/0x360\r\n kthread+0xe7/0x220\r\n ret_from_fork+0x13a/0x160\r\n ret_from_fork_asm+0x1a/0x30\r\n \u003c/TASK\u003e\r\n\r\nIf the software RoCE device is used, ibdev-\u003edma_device is a null pointer.\r\nAs a result, the problem occurs. Null pointer detection is added to\r\nprevent problems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39857"
},
{
"cve": "CVE-2025-39860",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()\n\nsyzbot reported the splat below without a repro.\n\nIn the splat, a single thread calling bt_accept_dequeue() freed sk\nand touched it after that.\n\nThe root cause would be the racy l2cap_sock_cleanup_listen() call\nadded by the cited commit.\n\nbt_accept_dequeue() is called under lock_sock() except for\nl2cap_sock_release().\n\nTwo threads could see the same socket during the list iteration\nin bt_accept_dequeue():\n\n CPU1 CPU2 (close())\n ---- ----\n sock_hold(sk) sock_hold(sk);\n lock_sock(sk) \u003c-- block close()\n sock_put(sk)\n bt_accept_unlink(sk)\n sock_put(sk) \u003c-- refcnt by bt_accept_enqueue()\n release_sock(sk)\n lock_sock(sk)\n sock_put(sk)\n bt_accept_unlink(sk)\n sock_put(sk) \u003c-- last refcnt\n bt_accept_unlink(sk) \u003c-- UAF\n\nDepending on the timing, the other thread could show up in the\n\"Freed by task\" part.\n\nLet\u0027s call l2cap_sock_cleanup_listen() under lock_sock() in\nl2cap_sock_release().\n\n[0]:\nBUG: KASAN: slab-use-after-free in debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]\nBUG: KASAN: slab-use-after-free in do_raw_spin_lock+0x26f/0x2b0 kernel/locking/spinlock_debug.c:115\nRead of size 4 at addr ffff88803b7eb1c4 by task syz.5.3276/16995\nCPU: 3 UID: 0 PID: 16995 Comm: syz.5.3276 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xcd/0x630 mm/kasan/report.c:482\n kasan_report+0xe0/0x110 mm/kasan/report.c:595\n debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]\n do_raw_spin_lock+0x26f/0x2b0 kernel/locking/spinlock_debug.c:115\n spin_lock_bh include/linux/spinlock.h:356 [inline]\n release_sock+0x21/0x220 net/core/sock.c:3746\n bt_accept_dequeue+0x505/0x600 net/bluetooth/af_bluetooth.c:312\n l2cap_sock_cleanup_listen+0x5c/0x2a0 net/bluetooth/l2cap_sock.c:1451\n l2cap_sock_release+0x5c/0x210 net/bluetooth/l2cap_sock.c:1425\n __sock_release+0xb3/0x270 net/socket.c:649\n sock_close+0x1c/0x30 net/socket.c:1439\n __fput+0x3ff/0xb70 fs/file_table.c:468\n task_work_run+0x14d/0x240 kernel/task_work.c:227\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n exit_to_user_mode_loop+0xeb/0x110 kernel/entry/common.c:43\n exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline]\n do_syscall_64+0x3f6/0x4c0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f2accf8ebe9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffdb6cb1378 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4\nRAX: 0000000000000000 RBX: 00000000000426fb RCX: 00007f2accf8ebe9\nRDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003\nRBP: 00007f2acd1b7da0 R08: 0000000000000001 R09: 00000012b6cb166f\nR10: 0000001b30e20000 R11: 0000000000000246 R12: 00007f2acd1b609c\nR13: 00007f2acd1b6090 R14: ffffffffffffffff R15: 00007ffdb6cb1490\n \u003c/TASK\u003e\n\nAllocated by task 5326:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:388 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:405\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4365 [inline]\n __kmalloc_nopro\n---truncated---",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39860"
},
{
"cve": "CVE-2025-39864",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: fix use-after-free in cmp_bss()\n\nFollowing bss_free() quirk introduced in commit 776b3580178f\n(\"cfg80211: track hidden SSID networks properly\"), adjust\ncfg80211_update_known_bss() to free the last beacon frame\nelements only if they\u0027re not shared via the corresponding\n\u0027hidden_beacon_bss\u0027 pointer.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39864"
},
{
"cve": "CVE-2025-39865",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix NULL pointer dereference in tee_shm_put\n\ntee_shm_put have NULL pointer dereference:\n\n__optee_disable_shm_cache --\u003e\n\tshm = reg_pair_to_ptr(...);//shm maybe return NULL\n tee_shm_free(shm); --\u003e\n\t\ttee_shm_put(shm);//crash\n\nAdd check in tee_shm_put to fix it.\n\npanic log:\nUnable to handle kernel paging request at virtual address 0000000000100cca\nMem abort info:\nESR = 0x0000000096000004\nEC = 0x25: DABT (current EL), IL = 32 bits\nSET = 0, FnV = 0\nEA = 0, S1PTW = 0\nFSC = 0x04: level 0 translation fault\nData abort info:\nISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\nCM = 0, WnR = 0, TnD = 0, TagAccess = 0\nGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nuser pgtable: 4k pages, 48-bit VAs, pgdp=0000002049d07000\n[0000000000100cca] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 0000000096000004 [#1] SMP\nCPU: 2 PID: 14442 Comm: systemd-sleep Tainted: P OE ------- ----\n6.6.0-39-generic #38\nSource Version: 938b255f6cb8817c95b0dd5c8c2944acfce94b07\nHardware name: greatwall GW-001Y1A-FTH, BIOS Great Wall BIOS V3.0\n10/26/2022\npstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : tee_shm_put+0x24/0x188\nlr : tee_shm_free+0x14/0x28\nsp : ffff001f98f9faf0\nx29: ffff001f98f9faf0 x28: ffff0020df543cc0 x27: 0000000000000000\nx26: ffff001f811344a0 x25: ffff8000818dac00 x24: ffff800082d8d048\nx23: ffff001f850fcd18 x22: 0000000000000001 x21: ffff001f98f9fb88\nx20: ffff001f83e76218 x19: ffff001f83e761e0 x18: 000000000000ffff\nx17: 303a30303a303030 x16: 0000000000000000 x15: 0000000000000003\nx14: 0000000000000001 x13: 0000000000000000 x12: 0101010101010101\nx11: 0000000000000001 x10: 0000000000000001 x9 : ffff800080e08d0c\nx8 : ffff001f98f9fb88 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : ffff001f83e761e0 x1 : 00000000ffff001f x0 : 0000000000100cca\nCall trace:\ntee_shm_put+0x24/0x188\ntee_shm_free+0x14/0x28\n__optee_disable_shm_cache+0xa8/0x108\noptee_shutdown+0x28/0x38\nplatform_shutdown+0x28/0x40\ndevice_shutdown+0x144/0x2b0\nkernel_power_off+0x3c/0x80\nhibernate+0x35c/0x388\nstate_store+0x64/0x80\nkobj_attr_store+0x14/0x28\nsysfs_kf_write+0x48/0x60\nkernfs_fop_write_iter+0x128/0x1c0\nvfs_write+0x270/0x370\nksys_write+0x6c/0x100\n__arm64_sys_write+0x20/0x30\ninvoke_syscall+0x4c/0x120\nel0_svc_common.constprop.0+0x44/0xf0\ndo_el0_svc+0x24/0x38\nel0_svc+0x24/0x88\nel0t_64_sync_handler+0x134/0x150\nel0t_64_sync+0x14c/0x15",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39865"
},
{
"cve": "CVE-2025-39866",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: writeback: fix use-after-free in __mark_inode_dirty()\n\nAn use-after-free issue occurred when __mark_inode_dirty() get the\nbdi_writeback that was in the progress of switching.\n\nCPU: 1 PID: 562 Comm: systemd-random- Not tainted 6.6.56-gb4403bd46a8e #1\n......\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : __mark_inode_dirty+0x124/0x418\nlr : __mark_inode_dirty+0x118/0x418\nsp : ffffffc08c9dbbc0\n........\nCall trace:\n __mark_inode_dirty+0x124/0x418\n generic_update_time+0x4c/0x60\n file_modified+0xcc/0xd0\n ext4_buffered_write_iter+0x58/0x124\n ext4_file_write_iter+0x54/0x704\n vfs_write+0x1c0/0x308\n ksys_write+0x74/0x10c\n __arm64_sys_write+0x1c/0x28\n invoke_syscall+0x48/0x114\n el0_svc_common.constprop.0+0xc0/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x40/0xe4\n el0t_64_sync_handler+0x120/0x12c\n el0t_64_sync+0x194/0x198\n\nRoot cause is:\n\nsystemd-random-seed kworker\n----------------------------------------------------------------------\n___mark_inode_dirty inode_switch_wbs_work_fn\n\n spin_lock(\u0026inode-\u003ei_lock);\n inode_attach_wb\n locked_inode_to_wb_and_lock_list\n get inode-\u003ei_wb\n spin_unlock(\u0026inode-\u003ei_lock);\n spin_lock(\u0026wb-\u003elist_lock)\n spin_lock(\u0026inode-\u003ei_lock)\n inode_io_list_move_locked\n spin_unlock(\u0026wb-\u003elist_lock)\n spin_unlock(\u0026inode-\u003ei_lock)\n spin_lock(\u0026old_wb-\u003elist_lock)\n inode_do_switch_wbs\n spin_lock(\u0026inode-\u003ei_lock)\n inode-\u003ei_wb = new_wb\n spin_unlock(\u0026inode-\u003ei_lock)\n spin_unlock(\u0026old_wb-\u003elist_lock)\n wb_put_many(old_wb, nr_switched)\n cgwb_release\n old wb released\n wb_wakeup_delayed() accesses wb,\n then trigger the use-after-free\n issue\n\nFix this race condition by holding inode spinlock until\nwb_wakeup_delayed() finished.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-39866"
},
{
"cve": "CVE-2025-40300",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nx86/vmscape: Add conditional IBPB mitigation\r\n\r\nVMSCAPE is a vulnerability that exploits insufficient branch predictor\r\nisolation between a guest and a userspace hypervisor (like QEMU). Existing\r\nmitigations already protect kernel/KVM from a malicious guest. Userspace\r\ncan additionally be protected by flushing the branch predictors after a\r\nVMexit.\r\n\r\nSince it is the userspace that consumes the poisoned branch predictors,\r\nconditionally issue an IBPB after a VMexit and before returning to\r\nuserspace. Workloads that frequently switch between hypervisor and\r\nuserspace will incur the most overhead from the new IBPB.\r\n\r\nThis new IBPB is not integrated with the existing IBPB sites. For\r\ninstance, a task can use the existing speculation control prctl() to\r\nget an IBPB at context switch time. With this implementation, the\r\nIBPB is doubled up: one at context switch and another before running\r\nuserspace.\r\n\r\nThe intent is to integrate and optimize these cases post-embargo.\r\n\r\n[ dhansen: elaborate on suboptimal IBPB solution ]",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-40300"
},
{
"cve": "CVE-2025-43368",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26, iOS 26 and iPadOS 26, macOS Tahoe 26. Processing maliciously crafted web content may lead to an unexpected Safari crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-43368"
},
{
"cve": "CVE-2025-47219",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In GStreamer through 1.26.1, the isomp4 plugin\u0027s qtdemux_parse_trak function may read past the end of a heap buffer while parsing an MP4 file, possibly leading to information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-47219"
},
{
"cve": "CVE-2025-48989",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected.\n\nUsers are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-53057",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-53057"
},
{
"cve": "CVE-2025-53066",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-53066"
},
{
"cve": "CVE-2025-55752",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "summary",
"text": "Relative Path Traversal vulnerability in Apache Tomcat.\n\nThe fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.\n\n\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.\nUsers are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-55752"
},
{
"cve": "CVE-2025-55754",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"notes": [
{
"category": "summary",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.\n\nTomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems.\n\n\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected.\nUsers are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-55754"
},
{
"cve": "CVE-2025-61748",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 21.0.8 and 25; Oracle GraalVM for JDK: 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-61748"
},
{
"cve": "CVE-2025-61795",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "Improper Resource Shutdown or Release vulnerability in Apache Tomcat.\n\nIf an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.\n\n\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.\nUsers are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2025-61795"
},
{
"cve": "CVE-2026-2673",
"cwe": {
"id": "CWE-757",
"name": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected\npreferred key exchange group when its key exchange group configuration includes\nthe default by using the \u0027DEFAULT\u0027 keyword.\n\nImpact summary: A less preferred key exchange may be used even when a more\npreferred group is supported by both client and server, if the group\nwas not included among the client\u0027s initial predicated keyshares.\nThis will sometimes be the case with the new hybrid post-quantum groups,\nif the client chooses to defer their use until specifically requested by\nthe server.\n\nIf an OpenSSL TLS 1.3 server\u0027s configuration uses the \u0027DEFAULT\u0027 keyword to\ninterpolate the built-in default group list into its own configuration, perhaps\nadding or removing specific elements, then an implementation defect causes the\n\u0027DEFAULT\u0027 list to lose its \u0027tuple\u0027 structure, and all server-supported groups\nwere treated as a single sufficiently secure \u0027tuple\u0027, with the server not\nsending a Hello Retry Request (HRR) even when a group in a more preferred tuple\nwas mutually supported.\n\nAs a result, the client and server might fail to negotiate a mutually supported\npost-quantum key agreement group, such as \u0027X25519MLKEM768\u0027, if the client\u0027s\nconfiguration results in only \u0027classical\u0027 groups (such as \u0027X25519\u0027 being the\nonly ones in the client\u0027s initial keyshare prediction).\n\nOpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS\n1.3 key agreement group on TLS servers. The old syntax had a single \u0027flat\u0027\nlist of groups, and treated all the supported groups as sufficiently secure.\nIf any of the keyshares predicted by the client were supported by the server\nthe most preferred among these was selected, even if other groups supported by\nthe client, but not included in the list of predicted keyshares would have been\nmore preferred, if included.\n\nThe new syntax partitions the groups into distinct \u0027tuples\u0027 of roughly\nequivalent security. Within each tuple the most preferred group included among\nthe client\u0027s predicted keyshares is chosen, but if the client supports a group\nfrom a more preferred tuple, but did not predict any corresponding keyshares,\nthe server will ask the client to retry the ClientHello (by issuing a Hello\nRetry Request or HRR) with the most preferred mutually supported group.\n\nThe above works as expected when the server\u0027s configuration uses the built-in\ndefault group list, or explicitly defines its own list by directly defining the\nvarious desired groups and group \u0027tuples\u0027.\n\nNo OpenSSL FIPS modules are affected by this issue, the code in question lies\noutside the FIPS boundary.\n\nOpenSSL 3.6 and 3.5 are vulnerable to this issue.\n\nOpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released.\nOpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released.\n\nOpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-2673"
},
{
"cve": "CVE-2026-21925",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: RMI). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-21925"
},
{
"cve": "CVE-2026-21932",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: AWT, JavaFX). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-21932"
},
{
"cve": "CVE-2026-21933",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-21933"
},
{
"cve": "CVE-2026-21945",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-21945"
},
{
"cve": "CVE-2026-21947",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "Vulnerability in Oracle Java SE (component: JavaFX). Supported versions that are affected are Oracle Java SE: 8u471-b50. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-21947"
},
{
"cve": "CVE-2026-22924",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "summary",
"text": "The affected application does not properly restrict unauthenticated connections and is susceptible to resource exhaustion conditions.\r\nThis could allow an attacker to disrupt normal operations or perform unauthorized actions, potentially impacting system availability and integrity.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-22924"
},
{
"cve": "CVE-2026-22925",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "The affected application is susceptible to resource exhaustion when subjected to high volume of TCP SYN packets\r\nThis could allow an attacker to render the service unavailable and cause denial-of-service conditions by overwhelming system resources.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-22925"
},
{
"cve": "CVE-2026-28387",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: An uncommon configuration of clients performing DANE TLSA-based\nserver authentication, when paired with uncommon server DANE TLSA records, may\nresult in a use-after-free and/or double-free on the client side.\n\nImpact summary: A use after free can have a range of potential consequences\nsuch as the corruption of valid data, crashes or execution of arbitrary code.\n\nHowever, the issue only affects clients that make use of TLSA records with both\nthe PKIX-TA(0/PKIX-EE(1) certificate usages and the DANE-TA(2) certificate\nusage.\n\nBy far the most common deployment of DANE is in SMTP MTAs for which RFC7672\nrecommends that clients treat as \u0027unusable\u0027 any TLSA records that have the PKIX\ncertificate usages. These SMTP (or other similar) clients are not vulnerable\nto this issue. Conversely, any clients that support only the PKIX usages, and\nignore the DANE-TA(2) usage are also not vulnerable.\n\nThe client would also need to be communicating with a server that publishes a\nTLSA RRset with both types of TLSA records.\n\nNo FIPS modules are affected by this issue, the problem code is outside the\nFIPS module boundary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-28387"
},
{
"cve": "CVE-2026-28388",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: When a delta CRL that contains a Delta CRL Indicator extension\nis processed a NULL pointer dereference might happen if the required CRL\nNumber extension is missing.\n\nImpact summary: A NULL pointer dereference can trigger a crash which\nleads to a Denial of Service for an application.\n\nWhen CRL processing and delta CRL processing is enabled during X.509\ncertificate verification, the delta CRL processing does not check\nwhether the CRL Number extension is NULL before dereferencing it.\nWhen a malformed delta CRL file is being processed, this parameter\ncan be NULL, causing a NULL pointer dereference.\n\nExploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in\nthe verification context, the certificate being verified to contain a\nfreshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and\nan attacker to provide a malformed CRL to an application that processes it.\n\nThe vulnerability is limited to Denial of Service and cannot be escalated to\nachieve code execution or memory disclosure. For that reason the issue was\nassessed as Low severity according to our Security Policy.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,\nas the affected code is outside the OpenSSL FIPS module boundary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-28388"
},
{
"cve": "CVE-2026-28389",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: During processing of a crafted CMS EnvelopedData message\nwith KeyAgreeRecipientInfo a NULL pointer dereference can happen.\n\nImpact summary: Applications that process attacker-controlled CMS data may\ncrash before authentication or cryptographic operations occur resulting in\nDenial of Service.\n\nWhen a CMS EnvelopedData message that uses KeyAgreeRecipientInfo is\nprocessed, the optional parameters field of KeyEncryptionAlgorithmIdentifier\nis examined without checking for its presence. This results in a NULL\npointer dereference if the field is missing.\n\nApplications and services that call CMS_decrypt() on untrusted input\n(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the affected code is outside the OpenSSL FIPS module boundary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-28389"
},
{
"cve": "CVE-2026-28390",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: During processing of a crafted CMS EnvelopedData message\nwith KeyTransportRecipientInfo a NULL pointer dereference can happen.\n\nImpact summary: Applications that process attacker-controlled CMS data may\ncrash before authentication or cryptographic operations occur resulting in\nDenial of Service.\n\nWhen a CMS EnvelopedData message that uses KeyTransportRecipientInfo with\nRSA-OAEP encryption is processed, the optional parameters field of\nRSA-OAEP SourceFunc algorithm identifier is examined without checking\nfor its presence. This results in a NULL pointer dereference if the field\nis missing.\n\nApplications and services that call CMS_decrypt() on untrusted input\n(e.g., S/MIME processing or CMS-based protocols) are vulnerable.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\nissue, as the affected code is outside the OpenSSL FIPS module boundary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-28390"
},
{
"cve": "CVE-2026-31789",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Converting an excessively large OCTET STRING value to\r\na hexadecimal string leads to a heap buffer overflow on 32 bit platforms.\r\n\r\nImpact summary: A heap buffer overflow may lead to a crash or possibly\r\nan attacker controlled code execution or other undefined behavior.\r\n\r\nIf an attacker can supply a crafted X.509 certificate with an excessively\r\nlarge OCTET STRING value in extensions such as the Subject Key Identifier\r\n(SKID) or Authority Key Identifier (AKID) which are being converted to hex,\r\nthe size of the buffer needed for the result is calculated as multiplication\r\nof the input length by 3. On 32 bit platforms, this multiplication may overflow\r\nresulting in the allocation of a smaller buffer and a heap buffer overflow.\r\n\r\nApplications and services that print or log contents of untrusted X.509\r\ncertificates are vulnerable to this issue. As the certificates would have\r\nto have sizes of over 1 Gigabyte, printing or logging such certificates\r\nis a fairly unlikely operation and only 32 bit platforms are affected,\r\nthis issue was assigned Low severity.\r\n\r\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this\r\nissue, as the affected code is outside the OpenSSL FIPS module boundary.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-31789"
},
{
"cve": "CVE-2026-31790",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Applications using RSASVE key encapsulation to establish\na secret encryption key can send contents of an uninitialized memory buffer to\na malicious peer.\n\nImpact summary: The uninitialized buffer might contain sensitive data from the\nprevious execution of the application process which leads to sensitive data\nleakage to an attacker.\n\nRSA_public_encrypt() returns the number of bytes written on success and -1\non error. The affected code tests only whether the return value is non-zero.\nAs a result, if RSA encryption fails, encapsulation can still return success to\nthe caller, set the output lengths, and leave the caller to use the contents of\nthe ciphertext buffer as if a valid KEM ciphertext had been produced.\n\nIf applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an\nattacker-supplied invalid RSA public key without first validating that key,\nthen this may cause stale or uninitialized contents of the caller-provided\nciphertext buffer to be disclosed to the attacker in place of the KEM\nciphertext.\n\nAs a workaround calling EVP_PKEY_public_check() or\nEVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate\nthe issue.\n\nThe FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109814144/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2026-31790"
}
]
}
SUSE-SU-2025:20673-1
Vulnerability from csaf_suse - Published: 2025-09-05 12:22 - Updated: 2025-09-05 12:22| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/s… | self |
| https://www.suse.com/support/update/announcement/… | self |
| https://lists.suse.com/pipermail/sle-updates/2025… | self |
| https://bugzilla.suse.com/1244596 | self |
| https://www.suse.com/security/cve/CVE-2025-6052/ | self |
| https://www.suse.com/security/cve/CVE-2025-6052 | external |
| https://bugzilla.suse.com/1244596 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glib2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glib2 fixes the following issues:\n\n- CVE-2025-6052: Fix overflow check when expanding a GString (bsc#1244596).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-247",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20673-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20673-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520673-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20673-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041628.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244596",
"url": "https://bugzilla.suse.com/1244596"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6052 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6052/"
}
],
"title": "Security update for glib2",
"tracking": {
"current_release_date": "2025-09-05T12:22:09Z",
"generator": {
"date": "2025-09-05T12:22:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20673-1",
"initial_release_date": "2025-09-05T12:22:09Z",
"revision_history": [
{
"date": "2025-09-05T12:22:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.aarch64",
"product": {
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.aarch64",
"product_id": "glib2-tools-2.78.6-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"product_id": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"product_id": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"product_id": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"product_id": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.ppc64le",
"product": {
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.ppc64le",
"product_id": "glib2-tools-2.78.6-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"product": {
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"product_id": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"product": {
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"product_id": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"product_id": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"product_id": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.s390x",
"product": {
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.s390x",
"product_id": "glib2-tools-2.78.6-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"product": {
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"product_id": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"product": {
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"product_id": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"product_id": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"product_id": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.x86_64",
"product": {
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.x86_64",
"product_id": "glib2-tools-2.78.6-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"product_id": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"product_id": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"product_id": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"product_id": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.aarch64"
},
"product_reference": "glib2-tools-2.78.6-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.ppc64le"
},
"product_reference": "glib2-tools-2.78.6-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.s390x"
},
"product_reference": "glib2-tools-2.78.6-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.x86_64"
},
"product_reference": "glib2-tools-2.78.6-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.s390x"
},
"product_reference": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.s390x"
},
"product_reference": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6052"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in how GLib\u0027s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u0027t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6052",
"url": "https://www.suse.com/security/cve/CVE-2025-6052"
},
{
"category": "external",
"summary": "SUSE Bug 1244596 for CVE-2025-6052",
"url": "https://bugzilla.suse.com/1244596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:glib2-tools-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libgio-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libglib-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libgmodule-2_0-0-2.78.6-slfo.1.1_4.1.x86_64",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.aarch64",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.ppc64le",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.s390x",
"SUSE Linux Micro 6.1:libgobject-2_0-0-2.78.6-slfo.1.1_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-05T12:22:09Z",
"details": "important"
}
],
"title": "CVE-2025-6052"
}
]
}
SUSE-SU-2025:02167-1
Vulnerability from csaf_suse - Published: 2025-06-30 07:14 - Updated: 2025-06-30 07:14| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-lang-2.78.6-150600.4.16.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.16.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.16.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.16.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-lang-2.78.6-150600.4.16.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.16.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.16.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.16.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/s… | self |
| https://www.suse.com/support/update/announcement/… | self |
| https://lists.suse.com/pipermail/sle-updates/2025… | self |
| https://bugzilla.suse.com/1242844 | self |
| https://bugzilla.suse.com/1244596 | self |
| https://www.suse.com/security/cve/CVE-2025-4373/ | self |
| https://www.suse.com/security/cve/CVE-2025-6052/ | self |
| https://www.suse.com/security/cve/CVE-2025-4373 | external |
| https://bugzilla.suse.com/1242844 | external |
| https://www.suse.com/security/cve/CVE-2025-6052 | external |
| https://bugzilla.suse.com/1244596 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glib2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glib2 fixes the following issues:\n\n- CVE-2025-6052: Fixed integer overflow in g_string_maybe_expand() leads to potential buffer overflow in GString (bsc#1244596).\n- CVE-2025-4373: Fixed buffer underflow through glib/gstring.c via function g_string_insert_unichar (bsc#1242844).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2167,SUSE-SLE-Module-Basesystem-15-SP6-2025-2167,SUSE-SLE-Module-Basesystem-15-SP7-2025-2167,openSUSE-SLE-15.6-2025-2167",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02167-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02167-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502167-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02167-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040543.html"
},
{
"category": "self",
"summary": "SUSE Bug 1242844",
"url": "https://bugzilla.suse.com/1242844"
},
{
"category": "self",
"summary": "SUSE Bug 1244596",
"url": "https://bugzilla.suse.com/1244596"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4373 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6052 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6052/"
}
],
"title": "Security update for glib2",
"tracking": {
"current_release_date": "2025-06-30T07:14:42Z",
"generator": {
"date": "2025-06-30T07:14:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02167-1",
"initial_release_date": "2025-06-30T07:14:42Z",
"revision_history": [
{
"date": "2025-06-30T07:14:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.78.6-150600.4.16.1.aarch64",
"product": {
"name": "glib2-devel-2.78.6-150600.4.16.1.aarch64",
"product_id": "glib2-devel-2.78.6-150600.4.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.78.6-150600.4.16.1.aarch64",
"product": {
"name": "glib2-devel-static-2.78.6-150600.4.16.1.aarch64",
"product_id": "glib2-devel-static-2.78.6-150600.4.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.78.6-150600.4.16.1.aarch64",
"product": {
"name": "glib2-doc-2.78.6-150600.4.16.1.aarch64",
"product_id": "glib2-doc-2.78.6-150600.4.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.aarch64",
"product": {
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.aarch64",
"product_id": "glib2-tests-devel-2.78.6-150600.4.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.78.6-150600.4.16.1.aarch64",
"product": {
"name": "glib2-tools-2.78.6-150600.4.16.1.aarch64",
"product_id": "glib2-tools-2.78.6-150600.4.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"product_id": "libgio-2_0-0-2.78.6-150600.4.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"product_id": "libglib-2_0-0-2.78.6-150600.4.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"product_id": "libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"product_id": "libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"product": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"product_id": "libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product": {
"name": "glib2-devel-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product_id": "glib2-devel-64bit-2.78.6-150600.4.16.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "glib2-tools-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product": {
"name": "glib2-tools-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product_id": "glib2-tools-64bit-2.78.6-150600.4.16.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product": {
"name": "libgio-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product_id": "libgio-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product": {
"name": "libglib-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product_id": "libglib-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product": {
"name": "libgmodule-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product_id": "libgmodule-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product": {
"name": "libgobject-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product_id": "libgobject-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product": {
"name": "libgthread-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32",
"product_id": "libgthread-2_0-0-64bit-2.78.6-150600.4.16.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.78.6-150600.4.16.1.i586",
"product": {
"name": "glib2-devel-2.78.6-150600.4.16.1.i586",
"product_id": "glib2-devel-2.78.6-150600.4.16.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.78.6-150600.4.16.1.i586",
"product": {
"name": "glib2-devel-static-2.78.6-150600.4.16.1.i586",
"product_id": "glib2-devel-static-2.78.6-150600.4.16.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.78.6-150600.4.16.1.i586",
"product": {
"name": "glib2-doc-2.78.6-150600.4.16.1.i586",
"product_id": "glib2-doc-2.78.6-150600.4.16.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.i586",
"product": {
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.i586",
"product_id": "glib2-tests-devel-2.78.6-150600.4.16.1.i586"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.78.6-150600.4.16.1.i586",
"product": {
"name": "glib2-tools-2.78.6-150600.4.16.1.i586",
"product_id": "glib2-tools-2.78.6-150600.4.16.1.i586"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.i586",
"product": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.i586",
"product_id": "libgio-2_0-0-2.78.6-150600.4.16.1.i586"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.i586",
"product": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.i586",
"product_id": "libglib-2_0-0-2.78.6-150600.4.16.1.i586"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.i586",
"product": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.i586",
"product_id": "libgmodule-2_0-0-2.78.6-150600.4.16.1.i586"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.i586",
"product": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.i586",
"product_id": "libgobject-2_0-0-2.78.6-150600.4.16.1.i586"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.i586",
"product": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.i586",
"product_id": "libgthread-2_0-0-2.78.6-150600.4.16.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.78.6-150600.4.16.1.noarch",
"product": {
"name": "gio-branding-upstream-2.78.6-150600.4.16.1.noarch",
"product_id": "gio-branding-upstream-2.78.6-150600.4.16.1.noarch"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.78.6-150600.4.16.1.noarch",
"product": {
"name": "glib2-lang-2.78.6-150600.4.16.1.noarch",
"product_id": "glib2-lang-2.78.6-150600.4.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"product": {
"name": "glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"product_id": "glib2-devel-2.78.6-150600.4.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.78.6-150600.4.16.1.ppc64le",
"product": {
"name": "glib2-devel-static-2.78.6-150600.4.16.1.ppc64le",
"product_id": "glib2-devel-static-2.78.6-150600.4.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.78.6-150600.4.16.1.ppc64le",
"product": {
"name": "glib2-doc-2.78.6-150600.4.16.1.ppc64le",
"product_id": "glib2-doc-2.78.6-150600.4.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le",
"product": {
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le",
"product_id": "glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"product": {
"name": "glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"product_id": "glib2-tools-2.78.6-150600.4.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"product": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"product_id": "libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"product": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"product_id": "libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"product_id": "libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"product_id": "libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"product": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"product_id": "libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.78.6-150600.4.16.1.s390x",
"product": {
"name": "glib2-devel-2.78.6-150600.4.16.1.s390x",
"product_id": "glib2-devel-2.78.6-150600.4.16.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.78.6-150600.4.16.1.s390x",
"product": {
"name": "glib2-devel-static-2.78.6-150600.4.16.1.s390x",
"product_id": "glib2-devel-static-2.78.6-150600.4.16.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.78.6-150600.4.16.1.s390x",
"product": {
"name": "glib2-doc-2.78.6-150600.4.16.1.s390x",
"product_id": "glib2-doc-2.78.6-150600.4.16.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.s390x",
"product": {
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.s390x",
"product_id": "glib2-tests-devel-2.78.6-150600.4.16.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.78.6-150600.4.16.1.s390x",
"product": {
"name": "glib2-tools-2.78.6-150600.4.16.1.s390x",
"product_id": "glib2-tools-2.78.6-150600.4.16.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"product": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"product_id": "libgio-2_0-0-2.78.6-150600.4.16.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"product": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"product_id": "libglib-2_0-0-2.78.6-150600.4.16.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"product_id": "libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"product_id": "libgobject-2_0-0-2.78.6-150600.4.16.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"product": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"product_id": "libgthread-2_0-0-2.78.6-150600.4.16.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-devel-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "glib2-devel-2.78.6-150600.4.16.1.x86_64",
"product_id": "glib2-devel-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64",
"product_id": "glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "glib2-devel-static-2.78.6-150600.4.16.1.x86_64",
"product_id": "glib2-devel-static-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-doc-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "glib2-doc-2.78.6-150600.4.16.1.x86_64",
"product_id": "glib2-doc-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.x86_64",
"product_id": "glib2-tests-devel-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "glib2-tools-2.78.6-150600.4.16.1.x86_64",
"product_id": "glib2-tools-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64",
"product_id": "glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"product_id": "libgio-2_0-0-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"product_id": "libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"product_id": "libglib-2_0-0-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"product_id": "libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"product_id": "libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"product_id": "libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"product_id": "libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"product_id": "libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"product_id": "libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"product": {
"name": "libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"product_id": "libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.78.6-150600.4.16.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-lang-2.78.6-150600.4.16.1.noarch"
},
"product_reference": "glib2-lang-2.78.6-150600.4.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.78.6-150600.4.16.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.16.1.noarch"
},
"product_reference": "glib2-lang-2.78.6-150600.4.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-upstream-2.78.6-150600.4.16.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.16.1.noarch"
},
"product_reference": "gio-branding-upstream-2.78.6-150600.4.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "glib2-devel-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.78.6-150600.4.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "glib2-devel-static-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.78.6-150600.4.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "glib2-devel-static-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.78.6-150600.4.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "glib2-devel-static-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "glib2-devel-static-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.78.6-150600.4.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "glib2-doc-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.78.6-150600.4.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "glib2-doc-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.78.6-150600.4.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "glib2-doc-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-doc-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "glib2-doc-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.78.6-150600.4.16.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.16.1.noarch"
},
"product_reference": "glib2-lang-2.78.6-150600.4.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "glib2-tests-devel-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "glib2-tests-devel-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "glib2-tests-devel-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "glib2-tools-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
},
"product_reference": "libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4373"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4373",
"url": "https://www.suse.com/security/cve/CVE-2025-4373"
},
{
"category": "external",
"summary": "SUSE Bug 1242844 for CVE-2025-4373",
"url": "https://bugzilla.suse.com/1242844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-30T07:14:42Z",
"details": "moderate"
}
],
"title": "CVE-2025-4373"
},
{
"cve": "CVE-2025-6052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6052"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in how GLib\u0027s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u0027t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6052",
"url": "https://www.suse.com/security/cve/CVE-2025-6052"
},
{
"category": "external",
"summary": "SUSE Bug 1244596 for CVE-2025-6052",
"url": "https://bugzilla.suse.com/1244596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-lang-2.78.6-150600.4.16.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:gio-branding-upstream-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-devel-static-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-doc-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-lang-2.78.6-150600.4.16.1.noarch",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tests-devel-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:glib2-tools-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:glib2-tools-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgio-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgio-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libglib-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libglib-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgmodule-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgmodule-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgobject-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgobject-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.aarch64",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.ppc64le",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.s390x",
"openSUSE Leap 15.6:libgthread-2_0-0-2.78.6-150600.4.16.1.x86_64",
"openSUSE Leap 15.6:libgthread-2_0-0-32bit-2.78.6-150600.4.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-30T07:14:42Z",
"details": "important"
}
],
"title": "CVE-2025-6052"
}
]
}
SUSE-SU-2025:20508-1
Vulnerability from csaf_suse - Published: 2025-07-24 11:51 - Updated: 2025-07-24 11:51| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/s… | self |
| https://www.suse.com/support/update/announcement/… | self |
| https://lists.suse.com/pipermail/sle-updates/2025… | self |
| https://bugzilla.suse.com/1242844 | self |
| https://bugzilla.suse.com/1244596 | self |
| https://www.suse.com/security/cve/CVE-2025-4373/ | self |
| https://www.suse.com/security/cve/CVE-2025-6052/ | self |
| https://www.suse.com/security/cve/CVE-2025-4373 | external |
| https://bugzilla.suse.com/1242844 | external |
| https://www.suse.com/security/cve/CVE-2025-6052 | external |
| https://bugzilla.suse.com/1244596 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glib2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glib2 fixes the following issues:\n\n- CVE-2025-4373: Fixed buffer underflow through glib/gstring.c via \n function g_string_insert_unichar (bsc#1242844)\n- CVE-2025-6052: Fixed integer overflow in g_string_maybe_expand() \n leads to potential buffer overflow in GString (bsc#1244596)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-395",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20508-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20508-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520508-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20508-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041043.html"
},
{
"category": "self",
"summary": "SUSE Bug 1242844",
"url": "https://bugzilla.suse.com/1242844"
},
{
"category": "self",
"summary": "SUSE Bug 1244596",
"url": "https://bugzilla.suse.com/1244596"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4373 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6052 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6052/"
}
],
"title": "Security update for glib2",
"tracking": {
"current_release_date": "2025-07-24T11:51:08Z",
"generator": {
"date": "2025-07-24T11:51:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20508-1",
"initial_release_date": "2025-07-24T11:51:08Z",
"revision_history": [
{
"date": "2025-07-24T11:51:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.76.2-9.1.aarch64",
"product": {
"name": "glib2-tools-2.76.2-9.1.aarch64",
"product_id": "glib2-tools-2.76.2-9.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.76.2-9.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.76.2-9.1.aarch64",
"product_id": "libgio-2_0-0-2.76.2-9.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.76.2-9.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.76.2-9.1.aarch64",
"product_id": "libglib-2_0-0-2.76.2-9.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.76.2-9.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.76.2-9.1.aarch64",
"product_id": "libgmodule-2_0-0-2.76.2-9.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.76.2-9.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.76.2-9.1.aarch64",
"product_id": "libgobject-2_0-0-2.76.2-9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.76.2-9.1.s390x",
"product": {
"name": "glib2-tools-2.76.2-9.1.s390x",
"product_id": "glib2-tools-2.76.2-9.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.76.2-9.1.s390x",
"product": {
"name": "libgio-2_0-0-2.76.2-9.1.s390x",
"product_id": "libgio-2_0-0-2.76.2-9.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.76.2-9.1.s390x",
"product": {
"name": "libglib-2_0-0-2.76.2-9.1.s390x",
"product_id": "libglib-2_0-0-2.76.2-9.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.76.2-9.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.76.2-9.1.s390x",
"product_id": "libgmodule-2_0-0-2.76.2-9.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.76.2-9.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.76.2-9.1.s390x",
"product_id": "libgobject-2_0-0-2.76.2-9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glib2-tools-2.76.2-9.1.x86_64",
"product": {
"name": "glib2-tools-2.76.2-9.1.x86_64",
"product_id": "glib2-tools-2.76.2-9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.76.2-9.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.76.2-9.1.x86_64",
"product_id": "libgio-2_0-0-2.76.2-9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.76.2-9.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.76.2-9.1.x86_64",
"product_id": "libglib-2_0-0-2.76.2-9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.76.2-9.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.76.2-9.1.x86_64",
"product_id": "libgmodule-2_0-0-2.76.2-9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.76.2-9.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.76.2-9.1.x86_64",
"product_id": "libgobject-2_0-0-2.76.2-9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.76.2-9.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.aarch64"
},
"product_reference": "glib2-tools-2.76.2-9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.76.2-9.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.s390x"
},
"product_reference": "glib2-tools-2.76.2-9.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.76.2-9.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.x86_64"
},
"product_reference": "glib2-tools-2.76.2-9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.76.2-9.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.76.2-9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.76.2-9.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.s390x"
},
"product_reference": "libgio-2_0-0-2.76.2-9.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.76.2-9.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.76.2-9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.76.2-9.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.76.2-9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.76.2-9.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.s390x"
},
"product_reference": "libglib-2_0-0-2.76.2-9.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.76.2-9.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.76.2-9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.76.2-9.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.76.2-9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.76.2-9.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.76.2-9.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.76.2-9.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.76.2-9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.76.2-9.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.76.2-9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.76.2-9.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.76.2-9.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.76.2-9.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.76.2-9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-4373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4373"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4373",
"url": "https://www.suse.com/security/cve/CVE-2025-4373"
},
{
"category": "external",
"summary": "SUSE Bug 1242844 for CVE-2025-4373",
"url": "https://bugzilla.suse.com/1242844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-24T11:51:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-4373"
},
{
"cve": "CVE-2025-6052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6052"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in how GLib\u0027s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u0027t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6052",
"url": "https://www.suse.com/security/cve/CVE-2025-6052"
},
{
"category": "external",
"summary": "SUSE Bug 1244596 for CVE-2025-6052",
"url": "https://bugzilla.suse.com/1244596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:glib2-tools-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgio-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libglib-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgmodule-2_0-0-2.76.2-9.1.x86_64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.aarch64",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.s390x",
"SUSE Linux Micro 6.0:libgobject-2_0-0-2.76.2-9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-24T11:51:08Z",
"details": "important"
}
],
"title": "CVE-2025-6052"
}
]
}
BDU:2025-12471
Vulnerability from fstec - Published: 03.06.2025{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, The GNOME Project",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.7 (Astra Linux Special Edition), \u043e\u0442 2.75.3 \u0434\u043e 2.84.3 (Glib)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f GLib:\nhttps://gitlab.gnome.org/GNOME/glib/-/commit/987309f23ada52592bffdb5db0d8a5d58bd8097b\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 glib2.0 \u0434\u043e 2.58.3-2+deb10u8+ci4 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2025-0923SE17",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "03.06.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "06.10.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "06.10.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-12471",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-6052",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Glib",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0430\u0431\u043e\u0440\u0430 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a GLib, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u043c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0426\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0438\u043b\u0438 \u0446\u0438\u043a\u043b\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0441\u0434\u0432\u0438\u0433 (CWE-190)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0430\u0431\u043e\u0440\u0430 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a GLib \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u043c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://gitlab.gnome.org/GNOME/glib/-/commit/33d9ba2fcc907b4f9a6c0540f9976b64b6f59db2\nhttps://gitlab.gnome.org/GNOME/glib/-/commit/987309f23ada52592bffdb5db0d8a5d58bd8097b\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-6052\nhttps://security-tracker.debian.org/tracker/CVE-2025-6052\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2025-0923SE17",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-190",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 2,6)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,7)"
}
OPENSUSE-SU-2025:15221-1
Vulnerability from csaf_opensuse - Published: 2025-07-03 00:00 - Updated: 2025-07-03 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "gio-branding-upstream-2.84.3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the gio-branding-upstream-2.84.3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15221",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15221-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6052 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6052/"
}
],
"title": "gio-branding-upstream-2.84.3-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15221-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.84.3-1.1.aarch64",
"product": {
"name": "gio-branding-upstream-2.84.3-1.1.aarch64",
"product_id": "gio-branding-upstream-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-2.84.3-1.1.aarch64",
"product": {
"name": "glib2-devel-2.84.3-1.1.aarch64",
"product_id": "glib2-devel-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.84.3-1.1.aarch64",
"product": {
"name": "glib2-devel-32bit-2.84.3-1.1.aarch64",
"product_id": "glib2-devel-32bit-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.3-1.1.aarch64",
"product": {
"name": "glib2-devel-static-2.84.3-1.1.aarch64",
"product_id": "glib2-devel-static-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.84.3-1.1.aarch64",
"product": {
"name": "glib2-lang-2.84.3-1.1.aarch64",
"product_id": "glib2-lang-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.84.3-1.1.aarch64",
"product": {
"name": "glib2-tests-devel-2.84.3-1.1.aarch64",
"product_id": "glib2-tests-devel-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.3-1.1.aarch64",
"product": {
"name": "glib2-tools-2.84.3-1.1.aarch64",
"product_id": "glib2-tools-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.84.3-1.1.aarch64",
"product": {
"name": "glib2-tools-32bit-2.84.3-1.1.aarch64",
"product_id": "glib2-tools-32bit-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.3-1.1.aarch64",
"product": {
"name": "libgio-2_0-0-2.84.3-1.1.aarch64",
"product_id": "libgio-2_0-0-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.84.3-1.1.aarch64",
"product": {
"name": "libgio-2_0-0-32bit-2.84.3-1.1.aarch64",
"product_id": "libgio-2_0-0-32bit-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.3-1.1.aarch64",
"product": {
"name": "libgirepository-2_0-0-2.84.3-1.1.aarch64",
"product_id": "libgirepository-2_0-0-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.3-1.1.aarch64",
"product": {
"name": "libglib-2_0-0-2.84.3-1.1.aarch64",
"product_id": "libglib-2_0-0-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.84.3-1.1.aarch64",
"product": {
"name": "libglib-2_0-0-32bit-2.84.3-1.1.aarch64",
"product_id": "libglib-2_0-0-32bit-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.3-1.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-2.84.3-1.1.aarch64",
"product_id": "libgmodule-2_0-0-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.aarch64",
"product": {
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.aarch64",
"product_id": "libgmodule-2_0-0-32bit-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.3-1.1.aarch64",
"product": {
"name": "libgobject-2_0-0-2.84.3-1.1.aarch64",
"product_id": "libgobject-2_0-0-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.aarch64",
"product": {
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.aarch64",
"product_id": "libgobject-2_0-0-32bit-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.3-1.1.aarch64",
"product": {
"name": "libgthread-2_0-0-2.84.3-1.1.aarch64",
"product_id": "libgthread-2_0-0-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.aarch64",
"product": {
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.aarch64",
"product_id": "libgthread-2_0-0-32bit-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.aarch64",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.aarch64",
"product_id": "typelib-1_0-GLib-2_0-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.aarch64",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.aarch64",
"product_id": "typelib-1_0-GModule-2_0-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.aarch64",
"product_id": "typelib-1_0-GObject-2_0-2.84.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.aarch64",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.aarch64",
"product_id": "typelib-1_0-Gio-2_0-2.84.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.84.3-1.1.ppc64le",
"product": {
"name": "gio-branding-upstream-2.84.3-1.1.ppc64le",
"product_id": "gio-branding-upstream-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-2.84.3-1.1.ppc64le",
"product": {
"name": "glib2-devel-2.84.3-1.1.ppc64le",
"product_id": "glib2-devel-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.84.3-1.1.ppc64le",
"product": {
"name": "glib2-devel-32bit-2.84.3-1.1.ppc64le",
"product_id": "glib2-devel-32bit-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.3-1.1.ppc64le",
"product": {
"name": "glib2-devel-static-2.84.3-1.1.ppc64le",
"product_id": "glib2-devel-static-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.84.3-1.1.ppc64le",
"product": {
"name": "glib2-lang-2.84.3-1.1.ppc64le",
"product_id": "glib2-lang-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.84.3-1.1.ppc64le",
"product": {
"name": "glib2-tests-devel-2.84.3-1.1.ppc64le",
"product_id": "glib2-tests-devel-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.3-1.1.ppc64le",
"product": {
"name": "glib2-tools-2.84.3-1.1.ppc64le",
"product_id": "glib2-tools-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.84.3-1.1.ppc64le",
"product": {
"name": "glib2-tools-32bit-2.84.3-1.1.ppc64le",
"product_id": "glib2-tools-32bit-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.3-1.1.ppc64le",
"product": {
"name": "libgio-2_0-0-2.84.3-1.1.ppc64le",
"product_id": "libgio-2_0-0-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.84.3-1.1.ppc64le",
"product": {
"name": "libgio-2_0-0-32bit-2.84.3-1.1.ppc64le",
"product_id": "libgio-2_0-0-32bit-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.3-1.1.ppc64le",
"product": {
"name": "libgirepository-2_0-0-2.84.3-1.1.ppc64le",
"product_id": "libgirepository-2_0-0-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.3-1.1.ppc64le",
"product": {
"name": "libglib-2_0-0-2.84.3-1.1.ppc64le",
"product_id": "libglib-2_0-0-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.84.3-1.1.ppc64le",
"product": {
"name": "libglib-2_0-0-32bit-2.84.3-1.1.ppc64le",
"product_id": "libglib-2_0-0-32bit-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.3-1.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-2.84.3-1.1.ppc64le",
"product_id": "libgmodule-2_0-0-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.ppc64le",
"product": {
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.ppc64le",
"product_id": "libgmodule-2_0-0-32bit-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.3-1.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-2.84.3-1.1.ppc64le",
"product_id": "libgobject-2_0-0-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.ppc64le",
"product": {
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.ppc64le",
"product_id": "libgobject-2_0-0-32bit-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.3-1.1.ppc64le",
"product": {
"name": "libgthread-2_0-0-2.84.3-1.1.ppc64le",
"product_id": "libgthread-2_0-0-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.ppc64le",
"product": {
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.ppc64le",
"product_id": "libgthread-2_0-0-32bit-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.ppc64le",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.ppc64le",
"product_id": "typelib-1_0-GLib-2_0-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.ppc64le",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.ppc64le",
"product_id": "typelib-1_0-GModule-2_0-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.ppc64le",
"product_id": "typelib-1_0-GObject-2_0-2.84.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.ppc64le",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.ppc64le",
"product_id": "typelib-1_0-Gio-2_0-2.84.3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.84.3-1.1.s390x",
"product": {
"name": "gio-branding-upstream-2.84.3-1.1.s390x",
"product_id": "gio-branding-upstream-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-2.84.3-1.1.s390x",
"product": {
"name": "glib2-devel-2.84.3-1.1.s390x",
"product_id": "glib2-devel-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.84.3-1.1.s390x",
"product": {
"name": "glib2-devel-32bit-2.84.3-1.1.s390x",
"product_id": "glib2-devel-32bit-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.3-1.1.s390x",
"product": {
"name": "glib2-devel-static-2.84.3-1.1.s390x",
"product_id": "glib2-devel-static-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.84.3-1.1.s390x",
"product": {
"name": "glib2-lang-2.84.3-1.1.s390x",
"product_id": "glib2-lang-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.84.3-1.1.s390x",
"product": {
"name": "glib2-tests-devel-2.84.3-1.1.s390x",
"product_id": "glib2-tests-devel-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.3-1.1.s390x",
"product": {
"name": "glib2-tools-2.84.3-1.1.s390x",
"product_id": "glib2-tools-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.84.3-1.1.s390x",
"product": {
"name": "glib2-tools-32bit-2.84.3-1.1.s390x",
"product_id": "glib2-tools-32bit-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.3-1.1.s390x",
"product": {
"name": "libgio-2_0-0-2.84.3-1.1.s390x",
"product_id": "libgio-2_0-0-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.84.3-1.1.s390x",
"product": {
"name": "libgio-2_0-0-32bit-2.84.3-1.1.s390x",
"product_id": "libgio-2_0-0-32bit-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.3-1.1.s390x",
"product": {
"name": "libgirepository-2_0-0-2.84.3-1.1.s390x",
"product_id": "libgirepository-2_0-0-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.3-1.1.s390x",
"product": {
"name": "libglib-2_0-0-2.84.3-1.1.s390x",
"product_id": "libglib-2_0-0-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.84.3-1.1.s390x",
"product": {
"name": "libglib-2_0-0-32bit-2.84.3-1.1.s390x",
"product_id": "libglib-2_0-0-32bit-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.3-1.1.s390x",
"product": {
"name": "libgmodule-2_0-0-2.84.3-1.1.s390x",
"product_id": "libgmodule-2_0-0-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.s390x",
"product": {
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.s390x",
"product_id": "libgmodule-2_0-0-32bit-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.3-1.1.s390x",
"product": {
"name": "libgobject-2_0-0-2.84.3-1.1.s390x",
"product_id": "libgobject-2_0-0-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.s390x",
"product": {
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.s390x",
"product_id": "libgobject-2_0-0-32bit-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.3-1.1.s390x",
"product": {
"name": "libgthread-2_0-0-2.84.3-1.1.s390x",
"product_id": "libgthread-2_0-0-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.s390x",
"product": {
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.s390x",
"product_id": "libgthread-2_0-0-32bit-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.s390x",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.s390x",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.s390x",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.s390x",
"product_id": "typelib-1_0-GLib-2_0-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.s390x",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.s390x",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.s390x",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.s390x",
"product_id": "typelib-1_0-GModule-2_0-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.s390x",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.s390x",
"product_id": "typelib-1_0-GObject-2_0-2.84.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.s390x",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.s390x",
"product_id": "typelib-1_0-Gio-2_0-2.84.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gio-branding-upstream-2.84.3-1.1.x86_64",
"product": {
"name": "gio-branding-upstream-2.84.3-1.1.x86_64",
"product_id": "gio-branding-upstream-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-2.84.3-1.1.x86_64",
"product": {
"name": "glib2-devel-2.84.3-1.1.x86_64",
"product_id": "glib2-devel-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-32bit-2.84.3-1.1.x86_64",
"product": {
"name": "glib2-devel-32bit-2.84.3-1.1.x86_64",
"product_id": "glib2-devel-32bit-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-devel-static-2.84.3-1.1.x86_64",
"product": {
"name": "glib2-devel-static-2.84.3-1.1.x86_64",
"product_id": "glib2-devel-static-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-lang-2.84.3-1.1.x86_64",
"product": {
"name": "glib2-lang-2.84.3-1.1.x86_64",
"product_id": "glib2-lang-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tests-devel-2.84.3-1.1.x86_64",
"product": {
"name": "glib2-tests-devel-2.84.3-1.1.x86_64",
"product_id": "glib2-tests-devel-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-2.84.3-1.1.x86_64",
"product": {
"name": "glib2-tools-2.84.3-1.1.x86_64",
"product_id": "glib2-tools-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "glib2-tools-32bit-2.84.3-1.1.x86_64",
"product": {
"name": "glib2-tools-32bit-2.84.3-1.1.x86_64",
"product_id": "glib2-tools-32bit-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-2.84.3-1.1.x86_64",
"product": {
"name": "libgio-2_0-0-2.84.3-1.1.x86_64",
"product_id": "libgio-2_0-0-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgio-2_0-0-32bit-2.84.3-1.1.x86_64",
"product": {
"name": "libgio-2_0-0-32bit-2.84.3-1.1.x86_64",
"product_id": "libgio-2_0-0-32bit-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgirepository-2_0-0-2.84.3-1.1.x86_64",
"product": {
"name": "libgirepository-2_0-0-2.84.3-1.1.x86_64",
"product_id": "libgirepository-2_0-0-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-2.84.3-1.1.x86_64",
"product": {
"name": "libglib-2_0-0-2.84.3-1.1.x86_64",
"product_id": "libglib-2_0-0-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libglib-2_0-0-32bit-2.84.3-1.1.x86_64",
"product": {
"name": "libglib-2_0-0-32bit-2.84.3-1.1.x86_64",
"product_id": "libglib-2_0-0-32bit-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-2.84.3-1.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-2.84.3-1.1.x86_64",
"product_id": "libgmodule-2_0-0-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.x86_64",
"product": {
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.x86_64",
"product_id": "libgmodule-2_0-0-32bit-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-2.84.3-1.1.x86_64",
"product": {
"name": "libgobject-2_0-0-2.84.3-1.1.x86_64",
"product_id": "libgobject-2_0-0-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.x86_64",
"product": {
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.x86_64",
"product_id": "libgobject-2_0-0-32bit-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-2.84.3-1.1.x86_64",
"product": {
"name": "libgthread-2_0-0-2.84.3-1.1.x86_64",
"product_id": "libgthread-2_0-0-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.x86_64",
"product": {
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.x86_64",
"product_id": "libgthread-2_0-0-32bit-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.x86_64",
"product_id": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.x86_64",
"product_id": "typelib-1_0-GLib-2_0-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.x86_64",
"product_id": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.x86_64",
"product_id": "typelib-1_0-GModule-2_0-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.x86_64",
"product_id": "typelib-1_0-GObject-2_0-2.84.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.x86_64",
"product": {
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.x86_64",
"product_id": "typelib-1_0-Gio-2_0-2.84.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-upstream-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.aarch64"
},
"product_reference": "gio-branding-upstream-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-upstream-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.ppc64le"
},
"product_reference": "gio-branding-upstream-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-upstream-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.s390x"
},
"product_reference": "gio-branding-upstream-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gio-branding-upstream-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.x86_64"
},
"product_reference": "gio-branding-upstream-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.aarch64"
},
"product_reference": "glib2-devel-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.ppc64le"
},
"product_reference": "glib2-devel-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.s390x"
},
"product_reference": "glib2-devel-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.x86_64"
},
"product_reference": "glib2-devel-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-32bit-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.aarch64"
},
"product_reference": "glib2-devel-32bit-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-32bit-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.ppc64le"
},
"product_reference": "glib2-devel-32bit-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-32bit-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.s390x"
},
"product_reference": "glib2-devel-32bit-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-32bit-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.x86_64"
},
"product_reference": "glib2-devel-32bit-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.aarch64"
},
"product_reference": "glib2-devel-static-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.ppc64le"
},
"product_reference": "glib2-devel-static-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.s390x"
},
"product_reference": "glib2-devel-static-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-devel-static-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.x86_64"
},
"product_reference": "glib2-devel-static-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.aarch64"
},
"product_reference": "glib2-lang-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.ppc64le"
},
"product_reference": "glib2-lang-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.s390x"
},
"product_reference": "glib2-lang-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-lang-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.x86_64"
},
"product_reference": "glib2-lang-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.aarch64"
},
"product_reference": "glib2-tests-devel-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.ppc64le"
},
"product_reference": "glib2-tests-devel-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.s390x"
},
"product_reference": "glib2-tests-devel-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tests-devel-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.x86_64"
},
"product_reference": "glib2-tests-devel-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.aarch64"
},
"product_reference": "glib2-tools-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.ppc64le"
},
"product_reference": "glib2-tools-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.s390x"
},
"product_reference": "glib2-tools-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.x86_64"
},
"product_reference": "glib2-tools-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-32bit-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.aarch64"
},
"product_reference": "glib2-tools-32bit-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-32bit-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.ppc64le"
},
"product_reference": "glib2-tools-32bit-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-32bit-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.s390x"
},
"product_reference": "glib2-tools-32bit-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glib2-tools-32bit-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.x86_64"
},
"product_reference": "glib2-tools-32bit-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.aarch64"
},
"product_reference": "libgio-2_0-0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.ppc64le"
},
"product_reference": "libgio-2_0-0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.s390x"
},
"product_reference": "libgio-2_0-0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.x86_64"
},
"product_reference": "libgio-2_0-0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.aarch64"
},
"product_reference": "libgio-2_0-0-32bit-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.ppc64le"
},
"product_reference": "libgio-2_0-0-32bit-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.s390x"
},
"product_reference": "libgio-2_0-0-32bit-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgio-2_0-0-32bit-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.x86_64"
},
"product_reference": "libgio-2_0-0-32bit-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.aarch64"
},
"product_reference": "libgirepository-2_0-0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.ppc64le"
},
"product_reference": "libgirepository-2_0-0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.s390x"
},
"product_reference": "libgirepository-2_0-0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgirepository-2_0-0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.x86_64"
},
"product_reference": "libgirepository-2_0-0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.aarch64"
},
"product_reference": "libglib-2_0-0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.ppc64le"
},
"product_reference": "libglib-2_0-0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.s390x"
},
"product_reference": "libglib-2_0-0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.x86_64"
},
"product_reference": "libglib-2_0-0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.aarch64"
},
"product_reference": "libglib-2_0-0-32bit-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.ppc64le"
},
"product_reference": "libglib-2_0-0-32bit-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.s390x"
},
"product_reference": "libglib-2_0-0-32bit-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libglib-2_0-0-32bit-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.x86_64"
},
"product_reference": "libglib-2_0-0-32bit-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.s390x"
},
"product_reference": "libgmodule-2_0-0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.aarch64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.ppc64le"
},
"product_reference": "libgmodule-2_0-0-32bit-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.s390x"
},
"product_reference": "libgmodule-2_0-0-32bit-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgmodule-2_0-0-32bit-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.x86_64"
},
"product_reference": "libgmodule-2_0-0-32bit-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.aarch64"
},
"product_reference": "libgobject-2_0-0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.s390x"
},
"product_reference": "libgobject-2_0-0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.x86_64"
},
"product_reference": "libgobject-2_0-0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.aarch64"
},
"product_reference": "libgobject-2_0-0-32bit-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.ppc64le"
},
"product_reference": "libgobject-2_0-0-32bit-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.s390x"
},
"product_reference": "libgobject-2_0-0-32bit-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgobject-2_0-0-32bit-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.x86_64"
},
"product_reference": "libgobject-2_0-0-32bit-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.aarch64"
},
"product_reference": "libgthread-2_0-0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.s390x"
},
"product_reference": "libgthread-2_0-0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.x86_64"
},
"product_reference": "libgthread-2_0-0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.aarch64"
},
"product_reference": "libgthread-2_0-0-32bit-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.ppc64le"
},
"product_reference": "libgthread-2_0-0-32bit-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.s390x"
},
"product_reference": "libgthread-2_0-0-32bit-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgthread-2_0-0-32bit-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.x86_64"
},
"product_reference": "libgthread-2_0-0-32bit-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.s390x"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-GIRepository-3_0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.s390x"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLib-2_0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-GLib-2_0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.s390x"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-GLibUnix-2_0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.s390x"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GModule-2_0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-GModule-2_0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.s390x"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GObject-2_0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-GObject-2_0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.aarch64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.ppc64le"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.s390x"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-Gio-2_0-2.84.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.x86_64"
},
"product_reference": "typelib-1_0-Gio-2_0-2.84.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6052"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6052",
"url": "https://www.suse.com/security/cve/CVE-2025-6052"
},
{
"category": "external",
"summary": "SUSE Bug 1244596 for CVE-2025-6052",
"url": "https://bugzilla.suse.com/1244596"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:gio-branding-upstream-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-devel-static-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-lang-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tests-devel-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:glib2-tools-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgio-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgirepository-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libglib-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgmodule-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgobject-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:libgthread-2_0-0-32bit-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GIRepository-3_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLib-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GLibUnix-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GModule-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GObject-2_0-2.84.3-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-Gio-2_0-2.84.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-6052"
}
]
}
WID-SEC-W-2026-0164
Vulnerability from csaf_certbund - Published: 2026-01-20 23:00 - Updated: 2026-04-09 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway 10.6.0.0-10.6.0.8
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8
|
10.6.0.0-10.6.0.8 | |
|
IBM DataPower Gateway 10.6.1.0-10.6.6.0
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0
|
10.6.1.0-10.6.6.0 | |
|
IBM DataPower Gateway 10.5.0.0-10.5.0.20
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20
|
10.5.0.0-10.5.0.20 | |
|
IBM TXSeries for Multiplatforms 10.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_10.1
|
for Multiplatforms 10.1 | |
|
Amazon Corretto <11.0.30.7.1
Amazon / Corretto
|
<11.0.30.7.1 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Tenable Security Nessus Network Monitor <6.5.3
Tenable Security / Nessus Network Monitor
|
<6.5.3 | ||
|
Amazon Corretto <8.482.08.1
Amazon / Corretto
|
<8.482.08.1 | ||
|
Dell Data Protection Advisor
Dell
|
cpe:/a:dell:data_protection_advisor:-
|
— | |
|
IBM Sterling Connect:Direct
IBM
|
cpe:/a:ibm:sterling_connect%3adirect:-
|
— | |
|
Oracle GraalVM Enterprise Edition 21.3.16
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:enterprise_edition_21.3.16
|
Enterprise Edition 21.3.16 | |
|
IBM Java SDK
IBM
|
cpe:/a:ibm:jdk:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
IBM Semeru Runtime 11.0.12.0-11.0.29.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0
|
11.0.12.0-11.0.29.0 | |
|
IBM Semeru Runtime 17.0.0.0-17.0.17.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0
|
17.0.0.0-17.0.17.0 | |
|
IBM Semeru Runtime 8.0.302.0-8.0.472.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0
|
8.0.302.0-8.0.472.0 | |
|
IBM App Connect Enterprise 12.0.1.0-12.0.12.22
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22
|
12.0.1.0-12.0.12.22 | |
|
IBM InfoSphere Information Server
IBM
|
cpe:/a:ibm:infosphere_information_server:-
|
— | |
|
IBM Power Hardware Management Console
IBM
|
cpe:/a:ibm:hardware_management_console:-
|
— | |
|
IBM Integration Bus for z/OS 10.1.0.0-10.1.0.6
IBM / Integration Bus
|
cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos
|
for z/OS 10.1.0.0-10.1.0.6 | |
|
Oracle Java SE 25.0.1
Oracle / Java SE
|
cpe:/a:oracle:java_se:25.0.1
|
25.0.1 | |
|
Oracle Java SE 8u471-perf
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-perf
|
8u471-perf | |
|
Oracle GraalVM for JDK 21.0.9
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_21.0.9
|
for JDK 21.0.9 | |
|
Oracle GraalVM for JDK 17.0.17
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_17.0.17
|
for JDK 17.0.17 | |
|
Oracle Java SE 8u471
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471
|
8u471 | |
|
IBM Semeru Runtime 21.0.0.0-21.0.9.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0
|
21.0.0.0-21.0.9.0 | |
|
Hitachi Ops Center
Hitachi
|
cpe:/a:hitachi:ops_center:-
|
— | |
|
IBM Semeru Runtime 25.0.0.0-25.0.1.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0
|
25.0.0.0-25.0.1.0 | |
|
Azul Zulu
Azul
|
cpe:/a:azul:zulu:-
|
— | |
|
IBM TXSeries for Multiplatforms 11.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_11.1
|
for Multiplatforms 11.1 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Dell NetWorker NRE <17.0.4
Dell / NetWorker
|
NRE <17.0.4 | ||
|
IBM TXSeries for Multiplatforms 8.2
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_8.2
|
for Multiplatforms 8.2 | |
|
IBM TXSeries for Multiplatforms 9.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_9.1
|
for Multiplatforms 9.1 | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise 13.0.1.0-13.0.6.1
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1
|
13.0.1.0-13.0.6.1 | |
|
Oracle Java SE 8u471-b50
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-b50
|
8u471-b50 | |
|
IBM Tivoli Business Service Manager 6.2.0
IBM / Tivoli Business Service Manager
|
cpe:/a:ibm:tivoli_business_service_manager:6.2.0
|
6.2.0 | |
|
IBM WebSphere Service Registry and Repository
IBM
|
cpe:/a:ibm:websphere_service_registry_and_repository:-
|
— | |
|
Hitachi Configuration Manager
Hitachi
|
cpe:/a:hitachi:configuration_manager:-
|
— | |
|
IBM WebSphere Application Server
IBM
|
cpe:/a:ibm:websphere_application_server:-
|
— | |
|
IBM Tivoli Monitoring 6.3.0.7
IBM / Tivoli Monitoring
|
cpe:/a:ibm:tivoli_monitoring:6.3.0.7
|
6.3.0.7 | |
|
Hitachi Command Suite
Hitachi
|
cpe:/a:hitachi:command_suite:-
|
— | |
|
Oracle Java SE 21.0.9
Oracle / Java SE
|
cpe:/a:oracle:java_se:21.0.9
|
21.0.9 | |
|
Oracle Java SE 17.0.17
Oracle / Java SE
|
cpe:/a:oracle:java_se:17.0.17
|
17.0.17 | |
|
Dell NetWorker NRE <8.0.28
Dell / NetWorker
|
NRE <8.0.28 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Secure Connect Gateway <5.34.00.16
Dell / Secure Connect Gateway
|
<5.34.00.16 | ||
|
Oracle Java SE 11.0.29
Oracle / Java SE
|
cpe:/a:oracle:java_se:11.0.29
|
11.0.29 | |
|
IBM App Connect Enterprise
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source OpenJDK
Open Source
|
cpe:/a:oracle:openjdk:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway 10.6.0.0-10.6.0.8
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8
|
10.6.0.0-10.6.0.8 | |
|
IBM DataPower Gateway 10.6.1.0-10.6.6.0
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0
|
10.6.1.0-10.6.6.0 | |
|
IBM DataPower Gateway 10.5.0.0-10.5.0.20
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20
|
10.5.0.0-10.5.0.20 | |
|
IBM TXSeries for Multiplatforms 10.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_10.1
|
for Multiplatforms 10.1 | |
|
Amazon Corretto <11.0.30.7.1
Amazon / Corretto
|
<11.0.30.7.1 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Tenable Security Nessus Network Monitor <6.5.3
Tenable Security / Nessus Network Monitor
|
<6.5.3 | ||
|
Amazon Corretto <8.482.08.1
Amazon / Corretto
|
<8.482.08.1 | ||
|
Dell Data Protection Advisor
Dell
|
cpe:/a:dell:data_protection_advisor:-
|
— | |
|
IBM Sterling Connect:Direct
IBM
|
cpe:/a:ibm:sterling_connect%3adirect:-
|
— | |
|
Oracle GraalVM Enterprise Edition 21.3.16
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:enterprise_edition_21.3.16
|
Enterprise Edition 21.3.16 | |
|
IBM Java SDK
IBM
|
cpe:/a:ibm:jdk:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
IBM Semeru Runtime 11.0.12.0-11.0.29.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0
|
11.0.12.0-11.0.29.0 | |
|
IBM Semeru Runtime 17.0.0.0-17.0.17.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0
|
17.0.0.0-17.0.17.0 | |
|
IBM Semeru Runtime 8.0.302.0-8.0.472.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0
|
8.0.302.0-8.0.472.0 | |
|
IBM App Connect Enterprise 12.0.1.0-12.0.12.22
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22
|
12.0.1.0-12.0.12.22 | |
|
IBM InfoSphere Information Server
IBM
|
cpe:/a:ibm:infosphere_information_server:-
|
— | |
|
IBM Power Hardware Management Console
IBM
|
cpe:/a:ibm:hardware_management_console:-
|
— | |
|
IBM Integration Bus for z/OS 10.1.0.0-10.1.0.6
IBM / Integration Bus
|
cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos
|
for z/OS 10.1.0.0-10.1.0.6 | |
|
Oracle Java SE 25.0.1
Oracle / Java SE
|
cpe:/a:oracle:java_se:25.0.1
|
25.0.1 | |
|
Oracle Java SE 8u471-perf
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-perf
|
8u471-perf | |
|
Oracle GraalVM for JDK 21.0.9
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_21.0.9
|
for JDK 21.0.9 | |
|
Oracle GraalVM for JDK 17.0.17
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_17.0.17
|
for JDK 17.0.17 | |
|
Oracle Java SE 8u471
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471
|
8u471 | |
|
IBM Semeru Runtime 21.0.0.0-21.0.9.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0
|
21.0.0.0-21.0.9.0 | |
|
Hitachi Ops Center
Hitachi
|
cpe:/a:hitachi:ops_center:-
|
— | |
|
IBM Semeru Runtime 25.0.0.0-25.0.1.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0
|
25.0.0.0-25.0.1.0 | |
|
Azul Zulu
Azul
|
cpe:/a:azul:zulu:-
|
— | |
|
IBM TXSeries for Multiplatforms 11.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_11.1
|
for Multiplatforms 11.1 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Dell NetWorker NRE <17.0.4
Dell / NetWorker
|
NRE <17.0.4 | ||
|
IBM TXSeries for Multiplatforms 8.2
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_8.2
|
for Multiplatforms 8.2 | |
|
IBM TXSeries for Multiplatforms 9.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_9.1
|
for Multiplatforms 9.1 | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise 13.0.1.0-13.0.6.1
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1
|
13.0.1.0-13.0.6.1 | |
|
Oracle Java SE 8u471-b50
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-b50
|
8u471-b50 | |
|
IBM Tivoli Business Service Manager 6.2.0
IBM / Tivoli Business Service Manager
|
cpe:/a:ibm:tivoli_business_service_manager:6.2.0
|
6.2.0 | |
|
IBM WebSphere Service Registry and Repository
IBM
|
cpe:/a:ibm:websphere_service_registry_and_repository:-
|
— | |
|
Hitachi Configuration Manager
Hitachi
|
cpe:/a:hitachi:configuration_manager:-
|
— | |
|
IBM WebSphere Application Server
IBM
|
cpe:/a:ibm:websphere_application_server:-
|
— | |
|
IBM Tivoli Monitoring 6.3.0.7
IBM / Tivoli Monitoring
|
cpe:/a:ibm:tivoli_monitoring:6.3.0.7
|
6.3.0.7 | |
|
Hitachi Command Suite
Hitachi
|
cpe:/a:hitachi:command_suite:-
|
— | |
|
Oracle Java SE 21.0.9
Oracle / Java SE
|
cpe:/a:oracle:java_se:21.0.9
|
21.0.9 | |
|
Oracle Java SE 17.0.17
Oracle / Java SE
|
cpe:/a:oracle:java_se:17.0.17
|
17.0.17 | |
|
Dell NetWorker NRE <8.0.28
Dell / NetWorker
|
NRE <8.0.28 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Secure Connect Gateway <5.34.00.16
Dell / Secure Connect Gateway
|
<5.34.00.16 | ||
|
Oracle Java SE 11.0.29
Oracle / Java SE
|
cpe:/a:oracle:java_se:11.0.29
|
11.0.29 | |
|
IBM App Connect Enterprise
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source OpenJDK
Open Source
|
cpe:/a:oracle:openjdk:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway 10.6.0.0-10.6.0.8
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8
|
10.6.0.0-10.6.0.8 | |
|
IBM DataPower Gateway 10.6.1.0-10.6.6.0
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0
|
10.6.1.0-10.6.6.0 | |
|
IBM DataPower Gateway 10.5.0.0-10.5.0.20
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20
|
10.5.0.0-10.5.0.20 | |
|
IBM TXSeries for Multiplatforms 10.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_10.1
|
for Multiplatforms 10.1 | |
|
Amazon Corretto <11.0.30.7.1
Amazon / Corretto
|
<11.0.30.7.1 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Tenable Security Nessus Network Monitor <6.5.3
Tenable Security / Nessus Network Monitor
|
<6.5.3 | ||
|
Amazon Corretto <8.482.08.1
Amazon / Corretto
|
<8.482.08.1 | ||
|
Dell Data Protection Advisor
Dell
|
cpe:/a:dell:data_protection_advisor:-
|
— | |
|
IBM Sterling Connect:Direct
IBM
|
cpe:/a:ibm:sterling_connect%3adirect:-
|
— | |
|
Oracle GraalVM Enterprise Edition 21.3.16
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:enterprise_edition_21.3.16
|
Enterprise Edition 21.3.16 | |
|
IBM Java SDK
IBM
|
cpe:/a:ibm:jdk:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
IBM Semeru Runtime 11.0.12.0-11.0.29.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0
|
11.0.12.0-11.0.29.0 | |
|
IBM Semeru Runtime 17.0.0.0-17.0.17.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0
|
17.0.0.0-17.0.17.0 | |
|
IBM Semeru Runtime 8.0.302.0-8.0.472.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0
|
8.0.302.0-8.0.472.0 | |
|
IBM App Connect Enterprise 12.0.1.0-12.0.12.22
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22
|
12.0.1.0-12.0.12.22 | |
|
IBM InfoSphere Information Server
IBM
|
cpe:/a:ibm:infosphere_information_server:-
|
— | |
|
IBM Power Hardware Management Console
IBM
|
cpe:/a:ibm:hardware_management_console:-
|
— | |
|
IBM Integration Bus for z/OS 10.1.0.0-10.1.0.6
IBM / Integration Bus
|
cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos
|
for z/OS 10.1.0.0-10.1.0.6 | |
|
Oracle Java SE 25.0.1
Oracle / Java SE
|
cpe:/a:oracle:java_se:25.0.1
|
25.0.1 | |
|
Oracle Java SE 8u471-perf
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-perf
|
8u471-perf | |
|
Oracle GraalVM for JDK 21.0.9
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_21.0.9
|
for JDK 21.0.9 | |
|
Oracle GraalVM for JDK 17.0.17
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_17.0.17
|
for JDK 17.0.17 | |
|
Oracle Java SE 8u471
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471
|
8u471 | |
|
IBM Semeru Runtime 21.0.0.0-21.0.9.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0
|
21.0.0.0-21.0.9.0 | |
|
Hitachi Ops Center
Hitachi
|
cpe:/a:hitachi:ops_center:-
|
— | |
|
IBM Semeru Runtime 25.0.0.0-25.0.1.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0
|
25.0.0.0-25.0.1.0 | |
|
Azul Zulu
Azul
|
cpe:/a:azul:zulu:-
|
— | |
|
IBM TXSeries for Multiplatforms 11.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_11.1
|
for Multiplatforms 11.1 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Dell NetWorker NRE <17.0.4
Dell / NetWorker
|
NRE <17.0.4 | ||
|
IBM TXSeries for Multiplatforms 8.2
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_8.2
|
for Multiplatforms 8.2 | |
|
IBM TXSeries for Multiplatforms 9.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_9.1
|
for Multiplatforms 9.1 | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise 13.0.1.0-13.0.6.1
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1
|
13.0.1.0-13.0.6.1 | |
|
Oracle Java SE 8u471-b50
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-b50
|
8u471-b50 | |
|
IBM Tivoli Business Service Manager 6.2.0
IBM / Tivoli Business Service Manager
|
cpe:/a:ibm:tivoli_business_service_manager:6.2.0
|
6.2.0 | |
|
IBM WebSphere Service Registry and Repository
IBM
|
cpe:/a:ibm:websphere_service_registry_and_repository:-
|
— | |
|
Hitachi Configuration Manager
Hitachi
|
cpe:/a:hitachi:configuration_manager:-
|
— | |
|
IBM WebSphere Application Server
IBM
|
cpe:/a:ibm:websphere_application_server:-
|
— | |
|
IBM Tivoli Monitoring 6.3.0.7
IBM / Tivoli Monitoring
|
cpe:/a:ibm:tivoli_monitoring:6.3.0.7
|
6.3.0.7 | |
|
Hitachi Command Suite
Hitachi
|
cpe:/a:hitachi:command_suite:-
|
— | |
|
Oracle Java SE 21.0.9
Oracle / Java SE
|
cpe:/a:oracle:java_se:21.0.9
|
21.0.9 | |
|
Oracle Java SE 17.0.17
Oracle / Java SE
|
cpe:/a:oracle:java_se:17.0.17
|
17.0.17 | |
|
Dell NetWorker NRE <8.0.28
Dell / NetWorker
|
NRE <8.0.28 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Secure Connect Gateway <5.34.00.16
Dell / Secure Connect Gateway
|
<5.34.00.16 | ||
|
Oracle Java SE 11.0.29
Oracle / Java SE
|
cpe:/a:oracle:java_se:11.0.29
|
11.0.29 | |
|
IBM App Connect Enterprise
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source OpenJDK
Open Source
|
cpe:/a:oracle:openjdk:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway 10.6.0.0-10.6.0.8
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8
|
10.6.0.0-10.6.0.8 | |
|
IBM DataPower Gateway 10.6.1.0-10.6.6.0
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0
|
10.6.1.0-10.6.6.0 | |
|
IBM DataPower Gateway 10.5.0.0-10.5.0.20
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20
|
10.5.0.0-10.5.0.20 | |
|
IBM TXSeries for Multiplatforms 10.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_10.1
|
for Multiplatforms 10.1 | |
|
Amazon Corretto <11.0.30.7.1
Amazon / Corretto
|
<11.0.30.7.1 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Tenable Security Nessus Network Monitor <6.5.3
Tenable Security / Nessus Network Monitor
|
<6.5.3 | ||
|
Amazon Corretto <8.482.08.1
Amazon / Corretto
|
<8.482.08.1 | ||
|
Dell Data Protection Advisor
Dell
|
cpe:/a:dell:data_protection_advisor:-
|
— | |
|
IBM Sterling Connect:Direct
IBM
|
cpe:/a:ibm:sterling_connect%3adirect:-
|
— | |
|
Oracle GraalVM Enterprise Edition 21.3.16
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:enterprise_edition_21.3.16
|
Enterprise Edition 21.3.16 | |
|
IBM Java SDK
IBM
|
cpe:/a:ibm:jdk:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
IBM Semeru Runtime 11.0.12.0-11.0.29.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0
|
11.0.12.0-11.0.29.0 | |
|
IBM Semeru Runtime 17.0.0.0-17.0.17.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0
|
17.0.0.0-17.0.17.0 | |
|
IBM Semeru Runtime 8.0.302.0-8.0.472.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0
|
8.0.302.0-8.0.472.0 | |
|
IBM App Connect Enterprise 12.0.1.0-12.0.12.22
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22
|
12.0.1.0-12.0.12.22 | |
|
IBM InfoSphere Information Server
IBM
|
cpe:/a:ibm:infosphere_information_server:-
|
— | |
|
IBM Power Hardware Management Console
IBM
|
cpe:/a:ibm:hardware_management_console:-
|
— | |
|
IBM Integration Bus for z/OS 10.1.0.0-10.1.0.6
IBM / Integration Bus
|
cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos
|
for z/OS 10.1.0.0-10.1.0.6 | |
|
Oracle Java SE 25.0.1
Oracle / Java SE
|
cpe:/a:oracle:java_se:25.0.1
|
25.0.1 | |
|
Oracle Java SE 8u471-perf
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-perf
|
8u471-perf | |
|
Oracle GraalVM for JDK 21.0.9
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_21.0.9
|
for JDK 21.0.9 | |
|
Oracle GraalVM for JDK 17.0.17
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_17.0.17
|
for JDK 17.0.17 | |
|
Oracle Java SE 8u471
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471
|
8u471 | |
|
IBM Semeru Runtime 21.0.0.0-21.0.9.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0
|
21.0.0.0-21.0.9.0 | |
|
Hitachi Ops Center
Hitachi
|
cpe:/a:hitachi:ops_center:-
|
— | |
|
IBM Semeru Runtime 25.0.0.0-25.0.1.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0
|
25.0.0.0-25.0.1.0 | |
|
Azul Zulu
Azul
|
cpe:/a:azul:zulu:-
|
— | |
|
IBM TXSeries for Multiplatforms 11.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_11.1
|
for Multiplatforms 11.1 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Dell NetWorker NRE <17.0.4
Dell / NetWorker
|
NRE <17.0.4 | ||
|
IBM TXSeries for Multiplatforms 8.2
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_8.2
|
for Multiplatforms 8.2 | |
|
IBM TXSeries for Multiplatforms 9.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_9.1
|
for Multiplatforms 9.1 | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise 13.0.1.0-13.0.6.1
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1
|
13.0.1.0-13.0.6.1 | |
|
Oracle Java SE 8u471-b50
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-b50
|
8u471-b50 | |
|
IBM Tivoli Business Service Manager 6.2.0
IBM / Tivoli Business Service Manager
|
cpe:/a:ibm:tivoli_business_service_manager:6.2.0
|
6.2.0 | |
|
IBM WebSphere Service Registry and Repository
IBM
|
cpe:/a:ibm:websphere_service_registry_and_repository:-
|
— | |
|
Hitachi Configuration Manager
Hitachi
|
cpe:/a:hitachi:configuration_manager:-
|
— | |
|
IBM WebSphere Application Server
IBM
|
cpe:/a:ibm:websphere_application_server:-
|
— | |
|
IBM Tivoli Monitoring 6.3.0.7
IBM / Tivoli Monitoring
|
cpe:/a:ibm:tivoli_monitoring:6.3.0.7
|
6.3.0.7 | |
|
Hitachi Command Suite
Hitachi
|
cpe:/a:hitachi:command_suite:-
|
— | |
|
Oracle Java SE 21.0.9
Oracle / Java SE
|
cpe:/a:oracle:java_se:21.0.9
|
21.0.9 | |
|
Oracle Java SE 17.0.17
Oracle / Java SE
|
cpe:/a:oracle:java_se:17.0.17
|
17.0.17 | |
|
Dell NetWorker NRE <8.0.28
Dell / NetWorker
|
NRE <8.0.28 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Secure Connect Gateway <5.34.00.16
Dell / Secure Connect Gateway
|
<5.34.00.16 | ||
|
Oracle Java SE 11.0.29
Oracle / Java SE
|
cpe:/a:oracle:java_se:11.0.29
|
11.0.29 | |
|
IBM App Connect Enterprise
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source OpenJDK
Open Source
|
cpe:/a:oracle:openjdk:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway 10.6.0.0-10.6.0.8
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8
|
10.6.0.0-10.6.0.8 | |
|
IBM DataPower Gateway 10.6.1.0-10.6.6.0
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0
|
10.6.1.0-10.6.6.0 | |
|
IBM DataPower Gateway 10.5.0.0-10.5.0.20
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20
|
10.5.0.0-10.5.0.20 | |
|
IBM TXSeries for Multiplatforms 10.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_10.1
|
for Multiplatforms 10.1 | |
|
Amazon Corretto <11.0.30.7.1
Amazon / Corretto
|
<11.0.30.7.1 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Tenable Security Nessus Network Monitor <6.5.3
Tenable Security / Nessus Network Monitor
|
<6.5.3 | ||
|
Amazon Corretto <8.482.08.1
Amazon / Corretto
|
<8.482.08.1 | ||
|
Dell Data Protection Advisor
Dell
|
cpe:/a:dell:data_protection_advisor:-
|
— | |
|
IBM Sterling Connect:Direct
IBM
|
cpe:/a:ibm:sterling_connect%3adirect:-
|
— | |
|
Oracle GraalVM Enterprise Edition 21.3.16
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:enterprise_edition_21.3.16
|
Enterprise Edition 21.3.16 | |
|
IBM Java SDK
IBM
|
cpe:/a:ibm:jdk:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
IBM Semeru Runtime 11.0.12.0-11.0.29.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0
|
11.0.12.0-11.0.29.0 | |
|
IBM Semeru Runtime 17.0.0.0-17.0.17.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0
|
17.0.0.0-17.0.17.0 | |
|
IBM Semeru Runtime 8.0.302.0-8.0.472.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0
|
8.0.302.0-8.0.472.0 | |
|
IBM App Connect Enterprise 12.0.1.0-12.0.12.22
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22
|
12.0.1.0-12.0.12.22 | |
|
IBM InfoSphere Information Server
IBM
|
cpe:/a:ibm:infosphere_information_server:-
|
— | |
|
IBM Power Hardware Management Console
IBM
|
cpe:/a:ibm:hardware_management_console:-
|
— | |
|
IBM Integration Bus for z/OS 10.1.0.0-10.1.0.6
IBM / Integration Bus
|
cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos
|
for z/OS 10.1.0.0-10.1.0.6 | |
|
Oracle Java SE 25.0.1
Oracle / Java SE
|
cpe:/a:oracle:java_se:25.0.1
|
25.0.1 | |
|
Oracle Java SE 8u471-perf
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-perf
|
8u471-perf | |
|
Oracle GraalVM for JDK 21.0.9
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_21.0.9
|
for JDK 21.0.9 | |
|
Oracle GraalVM for JDK 17.0.17
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_17.0.17
|
for JDK 17.0.17 | |
|
Oracle Java SE 8u471
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471
|
8u471 | |
|
IBM Semeru Runtime 21.0.0.0-21.0.9.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0
|
21.0.0.0-21.0.9.0 | |
|
Hitachi Ops Center
Hitachi
|
cpe:/a:hitachi:ops_center:-
|
— | |
|
IBM Semeru Runtime 25.0.0.0-25.0.1.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0
|
25.0.0.0-25.0.1.0 | |
|
Azul Zulu
Azul
|
cpe:/a:azul:zulu:-
|
— | |
|
IBM TXSeries for Multiplatforms 11.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_11.1
|
for Multiplatforms 11.1 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Dell NetWorker NRE <17.0.4
Dell / NetWorker
|
NRE <17.0.4 | ||
|
IBM TXSeries for Multiplatforms 8.2
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_8.2
|
for Multiplatforms 8.2 | |
|
IBM TXSeries for Multiplatforms 9.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_9.1
|
for Multiplatforms 9.1 | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise 13.0.1.0-13.0.6.1
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1
|
13.0.1.0-13.0.6.1 | |
|
Oracle Java SE 8u471-b50
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-b50
|
8u471-b50 | |
|
IBM Tivoli Business Service Manager 6.2.0
IBM / Tivoli Business Service Manager
|
cpe:/a:ibm:tivoli_business_service_manager:6.2.0
|
6.2.0 | |
|
IBM WebSphere Service Registry and Repository
IBM
|
cpe:/a:ibm:websphere_service_registry_and_repository:-
|
— | |
|
Hitachi Configuration Manager
Hitachi
|
cpe:/a:hitachi:configuration_manager:-
|
— | |
|
IBM WebSphere Application Server
IBM
|
cpe:/a:ibm:websphere_application_server:-
|
— | |
|
IBM Tivoli Monitoring 6.3.0.7
IBM / Tivoli Monitoring
|
cpe:/a:ibm:tivoli_monitoring:6.3.0.7
|
6.3.0.7 | |
|
Hitachi Command Suite
Hitachi
|
cpe:/a:hitachi:command_suite:-
|
— | |
|
Oracle Java SE 21.0.9
Oracle / Java SE
|
cpe:/a:oracle:java_se:21.0.9
|
21.0.9 | |
|
Oracle Java SE 17.0.17
Oracle / Java SE
|
cpe:/a:oracle:java_se:17.0.17
|
17.0.17 | |
|
Dell NetWorker NRE <8.0.28
Dell / NetWorker
|
NRE <8.0.28 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Secure Connect Gateway <5.34.00.16
Dell / Secure Connect Gateway
|
<5.34.00.16 | ||
|
Oracle Java SE 11.0.29
Oracle / Java SE
|
cpe:/a:oracle:java_se:11.0.29
|
11.0.29 | |
|
IBM App Connect Enterprise
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source OpenJDK
Open Source
|
cpe:/a:oracle:openjdk:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway 10.6.0.0-10.6.0.8
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8
|
10.6.0.0-10.6.0.8 | |
|
IBM DataPower Gateway 10.6.1.0-10.6.6.0
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0
|
10.6.1.0-10.6.6.0 | |
|
IBM DataPower Gateway 10.5.0.0-10.5.0.20
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20
|
10.5.0.0-10.5.0.20 | |
|
IBM TXSeries for Multiplatforms 10.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_10.1
|
for Multiplatforms 10.1 | |
|
Amazon Corretto <11.0.30.7.1
Amazon / Corretto
|
<11.0.30.7.1 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Tenable Security Nessus Network Monitor <6.5.3
Tenable Security / Nessus Network Monitor
|
<6.5.3 | ||
|
Amazon Corretto <8.482.08.1
Amazon / Corretto
|
<8.482.08.1 | ||
|
Dell Data Protection Advisor
Dell
|
cpe:/a:dell:data_protection_advisor:-
|
— | |
|
IBM Sterling Connect:Direct
IBM
|
cpe:/a:ibm:sterling_connect%3adirect:-
|
— | |
|
Oracle GraalVM Enterprise Edition 21.3.16
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:enterprise_edition_21.3.16
|
Enterprise Edition 21.3.16 | |
|
IBM Java SDK
IBM
|
cpe:/a:ibm:jdk:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
IBM Semeru Runtime 11.0.12.0-11.0.29.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0
|
11.0.12.0-11.0.29.0 | |
|
IBM Semeru Runtime 17.0.0.0-17.0.17.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0
|
17.0.0.0-17.0.17.0 | |
|
IBM Semeru Runtime 8.0.302.0-8.0.472.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0
|
8.0.302.0-8.0.472.0 | |
|
IBM App Connect Enterprise 12.0.1.0-12.0.12.22
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22
|
12.0.1.0-12.0.12.22 | |
|
IBM InfoSphere Information Server
IBM
|
cpe:/a:ibm:infosphere_information_server:-
|
— | |
|
IBM Power Hardware Management Console
IBM
|
cpe:/a:ibm:hardware_management_console:-
|
— | |
|
IBM Integration Bus for z/OS 10.1.0.0-10.1.0.6
IBM / Integration Bus
|
cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos
|
for z/OS 10.1.0.0-10.1.0.6 | |
|
Oracle Java SE 25.0.1
Oracle / Java SE
|
cpe:/a:oracle:java_se:25.0.1
|
25.0.1 | |
|
Oracle Java SE 8u471-perf
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-perf
|
8u471-perf | |
|
Oracle GraalVM for JDK 21.0.9
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_21.0.9
|
for JDK 21.0.9 | |
|
Oracle GraalVM for JDK 17.0.17
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_17.0.17
|
for JDK 17.0.17 | |
|
Oracle Java SE 8u471
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471
|
8u471 | |
|
IBM Semeru Runtime 21.0.0.0-21.0.9.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0
|
21.0.0.0-21.0.9.0 | |
|
Hitachi Ops Center
Hitachi
|
cpe:/a:hitachi:ops_center:-
|
— | |
|
IBM Semeru Runtime 25.0.0.0-25.0.1.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0
|
25.0.0.0-25.0.1.0 | |
|
Azul Zulu
Azul
|
cpe:/a:azul:zulu:-
|
— | |
|
IBM TXSeries for Multiplatforms 11.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_11.1
|
for Multiplatforms 11.1 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Dell NetWorker NRE <17.0.4
Dell / NetWorker
|
NRE <17.0.4 | ||
|
IBM TXSeries for Multiplatforms 8.2
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_8.2
|
for Multiplatforms 8.2 | |
|
IBM TXSeries for Multiplatforms 9.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_9.1
|
for Multiplatforms 9.1 | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise 13.0.1.0-13.0.6.1
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1
|
13.0.1.0-13.0.6.1 | |
|
Oracle Java SE 8u471-b50
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-b50
|
8u471-b50 | |
|
IBM Tivoli Business Service Manager 6.2.0
IBM / Tivoli Business Service Manager
|
cpe:/a:ibm:tivoli_business_service_manager:6.2.0
|
6.2.0 | |
|
IBM WebSphere Service Registry and Repository
IBM
|
cpe:/a:ibm:websphere_service_registry_and_repository:-
|
— | |
|
Hitachi Configuration Manager
Hitachi
|
cpe:/a:hitachi:configuration_manager:-
|
— | |
|
IBM WebSphere Application Server
IBM
|
cpe:/a:ibm:websphere_application_server:-
|
— | |
|
IBM Tivoli Monitoring 6.3.0.7
IBM / Tivoli Monitoring
|
cpe:/a:ibm:tivoli_monitoring:6.3.0.7
|
6.3.0.7 | |
|
Hitachi Command Suite
Hitachi
|
cpe:/a:hitachi:command_suite:-
|
— | |
|
Oracle Java SE 21.0.9
Oracle / Java SE
|
cpe:/a:oracle:java_se:21.0.9
|
21.0.9 | |
|
Oracle Java SE 17.0.17
Oracle / Java SE
|
cpe:/a:oracle:java_se:17.0.17
|
17.0.17 | |
|
Dell NetWorker NRE <8.0.28
Dell / NetWorker
|
NRE <8.0.28 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Secure Connect Gateway <5.34.00.16
Dell / Secure Connect Gateway
|
<5.34.00.16 | ||
|
Oracle Java SE 11.0.29
Oracle / Java SE
|
cpe:/a:oracle:java_se:11.0.29
|
11.0.29 | |
|
IBM App Connect Enterprise
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source OpenJDK
Open Source
|
cpe:/a:oracle:openjdk:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway 10.6.0.0-10.6.0.8
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8
|
10.6.0.0-10.6.0.8 | |
|
IBM DataPower Gateway 10.6.1.0-10.6.6.0
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0
|
10.6.1.0-10.6.6.0 | |
|
IBM DataPower Gateway 10.5.0.0-10.5.0.20
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20
|
10.5.0.0-10.5.0.20 | |
|
IBM TXSeries for Multiplatforms 10.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_10.1
|
for Multiplatforms 10.1 | |
|
Amazon Corretto <11.0.30.7.1
Amazon / Corretto
|
<11.0.30.7.1 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Tenable Security Nessus Network Monitor <6.5.3
Tenable Security / Nessus Network Monitor
|
<6.5.3 | ||
|
Amazon Corretto <8.482.08.1
Amazon / Corretto
|
<8.482.08.1 | ||
|
Dell Data Protection Advisor
Dell
|
cpe:/a:dell:data_protection_advisor:-
|
— | |
|
IBM Sterling Connect:Direct
IBM
|
cpe:/a:ibm:sterling_connect%3adirect:-
|
— | |
|
Oracle GraalVM Enterprise Edition 21.3.16
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:enterprise_edition_21.3.16
|
Enterprise Edition 21.3.16 | |
|
IBM Java SDK
IBM
|
cpe:/a:ibm:jdk:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
IBM Semeru Runtime 11.0.12.0-11.0.29.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0
|
11.0.12.0-11.0.29.0 | |
|
IBM Semeru Runtime 17.0.0.0-17.0.17.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0
|
17.0.0.0-17.0.17.0 | |
|
IBM Semeru Runtime 8.0.302.0-8.0.472.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0
|
8.0.302.0-8.0.472.0 | |
|
IBM App Connect Enterprise 12.0.1.0-12.0.12.22
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22
|
12.0.1.0-12.0.12.22 | |
|
IBM InfoSphere Information Server
IBM
|
cpe:/a:ibm:infosphere_information_server:-
|
— | |
|
IBM Power Hardware Management Console
IBM
|
cpe:/a:ibm:hardware_management_console:-
|
— | |
|
IBM Integration Bus for z/OS 10.1.0.0-10.1.0.6
IBM / Integration Bus
|
cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos
|
for z/OS 10.1.0.0-10.1.0.6 | |
|
Oracle Java SE 25.0.1
Oracle / Java SE
|
cpe:/a:oracle:java_se:25.0.1
|
25.0.1 | |
|
Oracle Java SE 8u471-perf
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-perf
|
8u471-perf | |
|
Oracle GraalVM for JDK 21.0.9
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_21.0.9
|
for JDK 21.0.9 | |
|
Oracle GraalVM for JDK 17.0.17
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_17.0.17
|
for JDK 17.0.17 | |
|
Oracle Java SE 8u471
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471
|
8u471 | |
|
IBM Semeru Runtime 21.0.0.0-21.0.9.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0
|
21.0.0.0-21.0.9.0 | |
|
Hitachi Ops Center
Hitachi
|
cpe:/a:hitachi:ops_center:-
|
— | |
|
IBM Semeru Runtime 25.0.0.0-25.0.1.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0
|
25.0.0.0-25.0.1.0 | |
|
Azul Zulu
Azul
|
cpe:/a:azul:zulu:-
|
— | |
|
IBM TXSeries for Multiplatforms 11.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_11.1
|
for Multiplatforms 11.1 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Dell NetWorker NRE <17.0.4
Dell / NetWorker
|
NRE <17.0.4 | ||
|
IBM TXSeries for Multiplatforms 8.2
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_8.2
|
for Multiplatforms 8.2 | |
|
IBM TXSeries for Multiplatforms 9.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_9.1
|
for Multiplatforms 9.1 | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise 13.0.1.0-13.0.6.1
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1
|
13.0.1.0-13.0.6.1 | |
|
Oracle Java SE 8u471-b50
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-b50
|
8u471-b50 | |
|
IBM Tivoli Business Service Manager 6.2.0
IBM / Tivoli Business Service Manager
|
cpe:/a:ibm:tivoli_business_service_manager:6.2.0
|
6.2.0 | |
|
IBM WebSphere Service Registry and Repository
IBM
|
cpe:/a:ibm:websphere_service_registry_and_repository:-
|
— | |
|
Hitachi Configuration Manager
Hitachi
|
cpe:/a:hitachi:configuration_manager:-
|
— | |
|
IBM WebSphere Application Server
IBM
|
cpe:/a:ibm:websphere_application_server:-
|
— | |
|
IBM Tivoli Monitoring 6.3.0.7
IBM / Tivoli Monitoring
|
cpe:/a:ibm:tivoli_monitoring:6.3.0.7
|
6.3.0.7 | |
|
Hitachi Command Suite
Hitachi
|
cpe:/a:hitachi:command_suite:-
|
— | |
|
Oracle Java SE 21.0.9
Oracle / Java SE
|
cpe:/a:oracle:java_se:21.0.9
|
21.0.9 | |
|
Oracle Java SE 17.0.17
Oracle / Java SE
|
cpe:/a:oracle:java_se:17.0.17
|
17.0.17 | |
|
Dell NetWorker NRE <8.0.28
Dell / NetWorker
|
NRE <8.0.28 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Secure Connect Gateway <5.34.00.16
Dell / Secure Connect Gateway
|
<5.34.00.16 | ||
|
Oracle Java SE 11.0.29
Oracle / Java SE
|
cpe:/a:oracle:java_se:11.0.29
|
11.0.29 | |
|
IBM App Connect Enterprise
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source OpenJDK
Open Source
|
cpe:/a:oracle:openjdk:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway 10.6.0.0-10.6.0.8
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8
|
10.6.0.0-10.6.0.8 | |
|
IBM DataPower Gateway 10.6.1.0-10.6.6.0
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0
|
10.6.1.0-10.6.6.0 | |
|
IBM DataPower Gateway 10.5.0.0-10.5.0.20
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20
|
10.5.0.0-10.5.0.20 | |
|
IBM TXSeries for Multiplatforms 10.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_10.1
|
for Multiplatforms 10.1 | |
|
Amazon Corretto <11.0.30.7.1
Amazon / Corretto
|
<11.0.30.7.1 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Tenable Security Nessus Network Monitor <6.5.3
Tenable Security / Nessus Network Monitor
|
<6.5.3 | ||
|
Amazon Corretto <8.482.08.1
Amazon / Corretto
|
<8.482.08.1 | ||
|
Dell Data Protection Advisor
Dell
|
cpe:/a:dell:data_protection_advisor:-
|
— | |
|
IBM Sterling Connect:Direct
IBM
|
cpe:/a:ibm:sterling_connect%3adirect:-
|
— | |
|
Oracle GraalVM Enterprise Edition 21.3.16
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:enterprise_edition_21.3.16
|
Enterprise Edition 21.3.16 | |
|
IBM Java SDK
IBM
|
cpe:/a:ibm:jdk:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
IBM Semeru Runtime 11.0.12.0-11.0.29.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0
|
11.0.12.0-11.0.29.0 | |
|
IBM Semeru Runtime 17.0.0.0-17.0.17.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0
|
17.0.0.0-17.0.17.0 | |
|
IBM Semeru Runtime 8.0.302.0-8.0.472.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0
|
8.0.302.0-8.0.472.0 | |
|
IBM App Connect Enterprise 12.0.1.0-12.0.12.22
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22
|
12.0.1.0-12.0.12.22 | |
|
IBM InfoSphere Information Server
IBM
|
cpe:/a:ibm:infosphere_information_server:-
|
— | |
|
IBM Power Hardware Management Console
IBM
|
cpe:/a:ibm:hardware_management_console:-
|
— | |
|
IBM Integration Bus for z/OS 10.1.0.0-10.1.0.6
IBM / Integration Bus
|
cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos
|
for z/OS 10.1.0.0-10.1.0.6 | |
|
Oracle Java SE 25.0.1
Oracle / Java SE
|
cpe:/a:oracle:java_se:25.0.1
|
25.0.1 | |
|
Oracle Java SE 8u471-perf
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-perf
|
8u471-perf | |
|
Oracle GraalVM for JDK 21.0.9
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_21.0.9
|
for JDK 21.0.9 | |
|
Oracle GraalVM for JDK 17.0.17
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_17.0.17
|
for JDK 17.0.17 | |
|
Oracle Java SE 8u471
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471
|
8u471 | |
|
IBM Semeru Runtime 21.0.0.0-21.0.9.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0
|
21.0.0.0-21.0.9.0 | |
|
Hitachi Ops Center
Hitachi
|
cpe:/a:hitachi:ops_center:-
|
— | |
|
IBM Semeru Runtime 25.0.0.0-25.0.1.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0
|
25.0.0.0-25.0.1.0 | |
|
Azul Zulu
Azul
|
cpe:/a:azul:zulu:-
|
— | |
|
IBM TXSeries for Multiplatforms 11.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_11.1
|
for Multiplatforms 11.1 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Dell NetWorker NRE <17.0.4
Dell / NetWorker
|
NRE <17.0.4 | ||
|
IBM TXSeries for Multiplatforms 8.2
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_8.2
|
for Multiplatforms 8.2 | |
|
IBM TXSeries for Multiplatforms 9.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_9.1
|
for Multiplatforms 9.1 | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise 13.0.1.0-13.0.6.1
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1
|
13.0.1.0-13.0.6.1 | |
|
Oracle Java SE 8u471-b50
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-b50
|
8u471-b50 | |
|
IBM Tivoli Business Service Manager 6.2.0
IBM / Tivoli Business Service Manager
|
cpe:/a:ibm:tivoli_business_service_manager:6.2.0
|
6.2.0 | |
|
IBM WebSphere Service Registry and Repository
IBM
|
cpe:/a:ibm:websphere_service_registry_and_repository:-
|
— | |
|
Hitachi Configuration Manager
Hitachi
|
cpe:/a:hitachi:configuration_manager:-
|
— | |
|
IBM WebSphere Application Server
IBM
|
cpe:/a:ibm:websphere_application_server:-
|
— | |
|
IBM Tivoli Monitoring 6.3.0.7
IBM / Tivoli Monitoring
|
cpe:/a:ibm:tivoli_monitoring:6.3.0.7
|
6.3.0.7 | |
|
Hitachi Command Suite
Hitachi
|
cpe:/a:hitachi:command_suite:-
|
— | |
|
Oracle Java SE 21.0.9
Oracle / Java SE
|
cpe:/a:oracle:java_se:21.0.9
|
21.0.9 | |
|
Oracle Java SE 17.0.17
Oracle / Java SE
|
cpe:/a:oracle:java_se:17.0.17
|
17.0.17 | |
|
Dell NetWorker NRE <8.0.28
Dell / NetWorker
|
NRE <8.0.28 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Secure Connect Gateway <5.34.00.16
Dell / Secure Connect Gateway
|
<5.34.00.16 | ||
|
Oracle Java SE 11.0.29
Oracle / Java SE
|
cpe:/a:oracle:java_se:11.0.29
|
11.0.29 | |
|
IBM App Connect Enterprise
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source OpenJDK
Open Source
|
cpe:/a:oracle:openjdk:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway 10.6.0.0-10.6.0.8
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8
|
10.6.0.0-10.6.0.8 | |
|
IBM DataPower Gateway 10.6.1.0-10.6.6.0
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0
|
10.6.1.0-10.6.6.0 | |
|
IBM DataPower Gateway 10.5.0.0-10.5.0.20
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20
|
10.5.0.0-10.5.0.20 | |
|
IBM TXSeries for Multiplatforms 10.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_10.1
|
for Multiplatforms 10.1 | |
|
Amazon Corretto <11.0.30.7.1
Amazon / Corretto
|
<11.0.30.7.1 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Tenable Security Nessus Network Monitor <6.5.3
Tenable Security / Nessus Network Monitor
|
<6.5.3 | ||
|
Amazon Corretto <8.482.08.1
Amazon / Corretto
|
<8.482.08.1 | ||
|
Dell Data Protection Advisor
Dell
|
cpe:/a:dell:data_protection_advisor:-
|
— | |
|
IBM Sterling Connect:Direct
IBM
|
cpe:/a:ibm:sterling_connect%3adirect:-
|
— | |
|
Oracle GraalVM Enterprise Edition 21.3.16
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:enterprise_edition_21.3.16
|
Enterprise Edition 21.3.16 | |
|
IBM Java SDK
IBM
|
cpe:/a:ibm:jdk:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
IBM Semeru Runtime 11.0.12.0-11.0.29.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0
|
11.0.12.0-11.0.29.0 | |
|
IBM Semeru Runtime 17.0.0.0-17.0.17.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0
|
17.0.0.0-17.0.17.0 | |
|
IBM Semeru Runtime 8.0.302.0-8.0.472.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0
|
8.0.302.0-8.0.472.0 | |
|
IBM App Connect Enterprise 12.0.1.0-12.0.12.22
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22
|
12.0.1.0-12.0.12.22 | |
|
IBM InfoSphere Information Server
IBM
|
cpe:/a:ibm:infosphere_information_server:-
|
— | |
|
IBM Power Hardware Management Console
IBM
|
cpe:/a:ibm:hardware_management_console:-
|
— | |
|
IBM Integration Bus for z/OS 10.1.0.0-10.1.0.6
IBM / Integration Bus
|
cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos
|
for z/OS 10.1.0.0-10.1.0.6 | |
|
Oracle Java SE 25.0.1
Oracle / Java SE
|
cpe:/a:oracle:java_se:25.0.1
|
25.0.1 | |
|
Oracle Java SE 8u471-perf
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-perf
|
8u471-perf | |
|
Oracle GraalVM for JDK 21.0.9
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_21.0.9
|
for JDK 21.0.9 | |
|
Oracle GraalVM for JDK 17.0.17
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_17.0.17
|
for JDK 17.0.17 | |
|
Oracle Java SE 8u471
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471
|
8u471 | |
|
IBM Semeru Runtime 21.0.0.0-21.0.9.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0
|
21.0.0.0-21.0.9.0 | |
|
Hitachi Ops Center
Hitachi
|
cpe:/a:hitachi:ops_center:-
|
— | |
|
IBM Semeru Runtime 25.0.0.0-25.0.1.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0
|
25.0.0.0-25.0.1.0 | |
|
Azul Zulu
Azul
|
cpe:/a:azul:zulu:-
|
— | |
|
IBM TXSeries for Multiplatforms 11.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_11.1
|
for Multiplatforms 11.1 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Dell NetWorker NRE <17.0.4
Dell / NetWorker
|
NRE <17.0.4 | ||
|
IBM TXSeries for Multiplatforms 8.2
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_8.2
|
for Multiplatforms 8.2 | |
|
IBM TXSeries for Multiplatforms 9.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_9.1
|
for Multiplatforms 9.1 | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise 13.0.1.0-13.0.6.1
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1
|
13.0.1.0-13.0.6.1 | |
|
Oracle Java SE 8u471-b50
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-b50
|
8u471-b50 | |
|
IBM Tivoli Business Service Manager 6.2.0
IBM / Tivoli Business Service Manager
|
cpe:/a:ibm:tivoli_business_service_manager:6.2.0
|
6.2.0 | |
|
IBM WebSphere Service Registry and Repository
IBM
|
cpe:/a:ibm:websphere_service_registry_and_repository:-
|
— | |
|
Hitachi Configuration Manager
Hitachi
|
cpe:/a:hitachi:configuration_manager:-
|
— | |
|
IBM WebSphere Application Server
IBM
|
cpe:/a:ibm:websphere_application_server:-
|
— | |
|
IBM Tivoli Monitoring 6.3.0.7
IBM / Tivoli Monitoring
|
cpe:/a:ibm:tivoli_monitoring:6.3.0.7
|
6.3.0.7 | |
|
Hitachi Command Suite
Hitachi
|
cpe:/a:hitachi:command_suite:-
|
— | |
|
Oracle Java SE 21.0.9
Oracle / Java SE
|
cpe:/a:oracle:java_se:21.0.9
|
21.0.9 | |
|
Oracle Java SE 17.0.17
Oracle / Java SE
|
cpe:/a:oracle:java_se:17.0.17
|
17.0.17 | |
|
Dell NetWorker NRE <8.0.28
Dell / NetWorker
|
NRE <8.0.28 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Secure Connect Gateway <5.34.00.16
Dell / Secure Connect Gateway
|
<5.34.00.16 | ||
|
Oracle Java SE 11.0.29
Oracle / Java SE
|
cpe:/a:oracle:java_se:11.0.29
|
11.0.29 | |
|
IBM App Connect Enterprise
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source OpenJDK
Open Source
|
cpe:/a:oracle:openjdk:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway 10.6.0.0-10.6.0.8
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8
|
10.6.0.0-10.6.0.8 | |
|
IBM DataPower Gateway 10.6.1.0-10.6.6.0
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0
|
10.6.1.0-10.6.6.0 | |
|
IBM DataPower Gateway 10.5.0.0-10.5.0.20
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20
|
10.5.0.0-10.5.0.20 | |
|
IBM TXSeries for Multiplatforms 10.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_10.1
|
for Multiplatforms 10.1 | |
|
Amazon Corretto <11.0.30.7.1
Amazon / Corretto
|
<11.0.30.7.1 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Tenable Security Nessus Network Monitor <6.5.3
Tenable Security / Nessus Network Monitor
|
<6.5.3 | ||
|
Amazon Corretto <8.482.08.1
Amazon / Corretto
|
<8.482.08.1 | ||
|
Dell Data Protection Advisor
Dell
|
cpe:/a:dell:data_protection_advisor:-
|
— | |
|
IBM Sterling Connect:Direct
IBM
|
cpe:/a:ibm:sterling_connect%3adirect:-
|
— | |
|
Oracle GraalVM Enterprise Edition 21.3.16
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:enterprise_edition_21.3.16
|
Enterprise Edition 21.3.16 | |
|
IBM Java SDK
IBM
|
cpe:/a:ibm:jdk:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
IBM Semeru Runtime 11.0.12.0-11.0.29.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0
|
11.0.12.0-11.0.29.0 | |
|
IBM Semeru Runtime 17.0.0.0-17.0.17.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0
|
17.0.0.0-17.0.17.0 | |
|
IBM Semeru Runtime 8.0.302.0-8.0.472.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0
|
8.0.302.0-8.0.472.0 | |
|
IBM App Connect Enterprise 12.0.1.0-12.0.12.22
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22
|
12.0.1.0-12.0.12.22 | |
|
IBM InfoSphere Information Server
IBM
|
cpe:/a:ibm:infosphere_information_server:-
|
— | |
|
IBM Power Hardware Management Console
IBM
|
cpe:/a:ibm:hardware_management_console:-
|
— | |
|
IBM Integration Bus for z/OS 10.1.0.0-10.1.0.6
IBM / Integration Bus
|
cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos
|
for z/OS 10.1.0.0-10.1.0.6 | |
|
Oracle Java SE 25.0.1
Oracle / Java SE
|
cpe:/a:oracle:java_se:25.0.1
|
25.0.1 | |
|
Oracle Java SE 8u471-perf
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-perf
|
8u471-perf | |
|
Oracle GraalVM for JDK 21.0.9
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_21.0.9
|
for JDK 21.0.9 | |
|
Oracle GraalVM for JDK 17.0.17
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_17.0.17
|
for JDK 17.0.17 | |
|
Oracle Java SE 8u471
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471
|
8u471 | |
|
IBM Semeru Runtime 21.0.0.0-21.0.9.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0
|
21.0.0.0-21.0.9.0 | |
|
Hitachi Ops Center
Hitachi
|
cpe:/a:hitachi:ops_center:-
|
— | |
|
IBM Semeru Runtime 25.0.0.0-25.0.1.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0
|
25.0.0.0-25.0.1.0 | |
|
Azul Zulu
Azul
|
cpe:/a:azul:zulu:-
|
— | |
|
IBM TXSeries for Multiplatforms 11.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_11.1
|
for Multiplatforms 11.1 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Dell NetWorker NRE <17.0.4
Dell / NetWorker
|
NRE <17.0.4 | ||
|
IBM TXSeries for Multiplatforms 8.2
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_8.2
|
for Multiplatforms 8.2 | |
|
IBM TXSeries for Multiplatforms 9.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_9.1
|
for Multiplatforms 9.1 | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise 13.0.1.0-13.0.6.1
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1
|
13.0.1.0-13.0.6.1 | |
|
Oracle Java SE 8u471-b50
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-b50
|
8u471-b50 | |
|
IBM Tivoli Business Service Manager 6.2.0
IBM / Tivoli Business Service Manager
|
cpe:/a:ibm:tivoli_business_service_manager:6.2.0
|
6.2.0 | |
|
IBM WebSphere Service Registry and Repository
IBM
|
cpe:/a:ibm:websphere_service_registry_and_repository:-
|
— | |
|
Hitachi Configuration Manager
Hitachi
|
cpe:/a:hitachi:configuration_manager:-
|
— | |
|
IBM WebSphere Application Server
IBM
|
cpe:/a:ibm:websphere_application_server:-
|
— | |
|
IBM Tivoli Monitoring 6.3.0.7
IBM / Tivoli Monitoring
|
cpe:/a:ibm:tivoli_monitoring:6.3.0.7
|
6.3.0.7 | |
|
Hitachi Command Suite
Hitachi
|
cpe:/a:hitachi:command_suite:-
|
— | |
|
Oracle Java SE 21.0.9
Oracle / Java SE
|
cpe:/a:oracle:java_se:21.0.9
|
21.0.9 | |
|
Oracle Java SE 17.0.17
Oracle / Java SE
|
cpe:/a:oracle:java_se:17.0.17
|
17.0.17 | |
|
Dell NetWorker NRE <8.0.28
Dell / NetWorker
|
NRE <8.0.28 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Secure Connect Gateway <5.34.00.16
Dell / Secure Connect Gateway
|
<5.34.00.16 | ||
|
Oracle Java SE 11.0.29
Oracle / Java SE
|
cpe:/a:oracle:java_se:11.0.29
|
11.0.29 | |
|
IBM App Connect Enterprise
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source OpenJDK
Open Source
|
cpe:/a:oracle:openjdk:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway 10.6.0.0-10.6.0.8
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8
|
10.6.0.0-10.6.0.8 | |
|
IBM DataPower Gateway 10.6.1.0-10.6.6.0
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0
|
10.6.1.0-10.6.6.0 | |
|
IBM DataPower Gateway 10.5.0.0-10.5.0.20
IBM / DataPower Gateway
|
cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20
|
10.5.0.0-10.5.0.20 | |
|
IBM TXSeries for Multiplatforms 10.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_10.1
|
for Multiplatforms 10.1 | |
|
Amazon Corretto <11.0.30.7.1
Amazon / Corretto
|
<11.0.30.7.1 | ||
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Tenable Security Nessus Network Monitor <6.5.3
Tenable Security / Nessus Network Monitor
|
<6.5.3 | ||
|
Amazon Corretto <8.482.08.1
Amazon / Corretto
|
<8.482.08.1 | ||
|
Dell Data Protection Advisor
Dell
|
cpe:/a:dell:data_protection_advisor:-
|
— | |
|
IBM Sterling Connect:Direct
IBM
|
cpe:/a:ibm:sterling_connect%3adirect:-
|
— | |
|
Oracle GraalVM Enterprise Edition 21.3.16
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:enterprise_edition_21.3.16
|
Enterprise Edition 21.3.16 | |
|
IBM Java SDK
IBM
|
cpe:/a:ibm:jdk:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
IBM Semeru Runtime 11.0.12.0-11.0.29.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0
|
11.0.12.0-11.0.29.0 | |
|
IBM Semeru Runtime 17.0.0.0-17.0.17.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0
|
17.0.0.0-17.0.17.0 | |
|
IBM Semeru Runtime 8.0.302.0-8.0.472.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0
|
8.0.302.0-8.0.472.0 | |
|
IBM App Connect Enterprise 12.0.1.0-12.0.12.22
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22
|
12.0.1.0-12.0.12.22 | |
|
IBM InfoSphere Information Server
IBM
|
cpe:/a:ibm:infosphere_information_server:-
|
— | |
|
IBM Power Hardware Management Console
IBM
|
cpe:/a:ibm:hardware_management_console:-
|
— | |
|
IBM Integration Bus for z/OS 10.1.0.0-10.1.0.6
IBM / Integration Bus
|
cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos
|
for z/OS 10.1.0.0-10.1.0.6 | |
|
Oracle Java SE 25.0.1
Oracle / Java SE
|
cpe:/a:oracle:java_se:25.0.1
|
25.0.1 | |
|
Oracle Java SE 8u471-perf
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-perf
|
8u471-perf | |
|
Oracle GraalVM for JDK 21.0.9
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_21.0.9
|
for JDK 21.0.9 | |
|
Oracle GraalVM for JDK 17.0.17
Oracle / GraalVM
|
cpe:/a:oracle:graalvm:for_jdk_17.0.17
|
for JDK 17.0.17 | |
|
Oracle Java SE 8u471
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471
|
8u471 | |
|
IBM Semeru Runtime 21.0.0.0-21.0.9.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0
|
21.0.0.0-21.0.9.0 | |
|
Hitachi Ops Center
Hitachi
|
cpe:/a:hitachi:ops_center:-
|
— | |
|
IBM Semeru Runtime 25.0.0.0-25.0.1.0
IBM / Semeru Runtime
|
cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0
|
25.0.0.0-25.0.1.0 | |
|
Azul Zulu
Azul
|
cpe:/a:azul:zulu:-
|
— | |
|
IBM TXSeries for Multiplatforms 11.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_11.1
|
for Multiplatforms 11.1 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Dell NetWorker NRE <17.0.4
Dell / NetWorker
|
NRE <17.0.4 | ||
|
IBM TXSeries for Multiplatforms 8.2
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_8.2
|
for Multiplatforms 8.2 | |
|
IBM TXSeries for Multiplatforms 9.1
IBM / TXSeries
|
cpe:/a:ibm:txseries:for_multiplatforms_9.1
|
for Multiplatforms 9.1 | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
IBM App Connect Enterprise 13.0.1.0-13.0.6.1
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1
|
13.0.1.0-13.0.6.1 | |
|
Oracle Java SE 8u471-b50
Oracle / Java SE
|
cpe:/a:oracle:java_se:8u471-b50
|
8u471-b50 | |
|
IBM Tivoli Business Service Manager 6.2.0
IBM / Tivoli Business Service Manager
|
cpe:/a:ibm:tivoli_business_service_manager:6.2.0
|
6.2.0 | |
|
IBM WebSphere Service Registry and Repository
IBM
|
cpe:/a:ibm:websphere_service_registry_and_repository:-
|
— | |
|
Hitachi Configuration Manager
Hitachi
|
cpe:/a:hitachi:configuration_manager:-
|
— | |
|
IBM WebSphere Application Server
IBM
|
cpe:/a:ibm:websphere_application_server:-
|
— | |
|
IBM Tivoli Monitoring 6.3.0.7
IBM / Tivoli Monitoring
|
cpe:/a:ibm:tivoli_monitoring:6.3.0.7
|
6.3.0.7 | |
|
Hitachi Command Suite
Hitachi
|
cpe:/a:hitachi:command_suite:-
|
— | |
|
Oracle Java SE 21.0.9
Oracle / Java SE
|
cpe:/a:oracle:java_se:21.0.9
|
21.0.9 | |
|
Oracle Java SE 17.0.17
Oracle / Java SE
|
cpe:/a:oracle:java_se:17.0.17
|
17.0.17 | |
|
Dell NetWorker NRE <8.0.28
Dell / NetWorker
|
NRE <8.0.28 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Secure Connect Gateway <5.34.00.16
Dell / Secure Connect Gateway
|
<5.34.00.16 | ||
|
Oracle Java SE 11.0.29
Oracle / Java SE
|
cpe:/a:oracle:java_se:11.0.29
|
11.0.29 | |
|
IBM App Connect Enterprise
IBM / App Connect Enterprise
|
cpe:/a:ibm:app_connect_enterprise:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source OpenJDK
Open Source
|
cpe:/a:oracle:openjdk:-
|
— |
| URL | Category |
|---|---|
| https://wid.cert-bund.de/.well-known/csaf/white/2… | self |
| https://wid.cert-bund.de/portal/wid/securityadvis… | self |
| https://www.oracle.com/security-alerts/cpujan2026… | external |
| https://github.com/corretto/corretto-8/blob/8.482… | external |
| https://github.com/corretto/corretto-11/blob/11.0… | external |
| https://docs.azul.com/core/pdfs/january-2026/azul… | external |
| https://access.redhat.com/errata/RHSA-2026:0848 | external |
| https://access.redhat.com/errata/RHSA-2026:0927 | external |
| https://access.redhat.com/errata/RHSA-2026:0849 | external |
| https://access.redhat.com/errata/RHSA-2026:0847 | external |
| https://linux.oracle.com/errata/ELSA-2026-0927.html | external |
| https://access.redhat.com/errata/RHSA-2026:0928 | external |
| https://errata.build.resf.org/RLSA-2026:0927 | external |
| https://errata.build.resf.org/RLSA-2026:0928 | external |
| https://lists.debian.org/debian-security-announce… | external |
| http://linux.oracle.com/errata/ELSA-2026-0928.html | external |
| https://lists.debian.org/debian-lts-announce/2026… | external |
| https://access.redhat.com/errata/RHSA-2026:0932 | external |
| https://access.redhat.com/errata/RHSA-2026:0898 | external |
| https://access.redhat.com/errata/RHSA-2026:0897 | external |
| https://lists.debian.org/debian-security-announce… | external |
| https://access.redhat.com/errata/RHSA-2026:0900 | external |
| https://lists.debian.org/debian-lts-announce/2026… | external |
| https://access.redhat.com/errata/RHSA-2026:0899 | external |
| https://access.redhat.com/errata/RHSA-2026:0901 | external |
| https://access.redhat.com/errata/RHSA-2026:0896 | external |
| https://access.redhat.com/errata/RHSA-2026:0931 | external |
| https://access.redhat.com/errata/RHSA-2026:0895 | external |
| https://access.redhat.com/errata/RHSA-2026:0933 | external |
| https://errata.build.resf.org/RLSA-2026:0932 | external |
| https://www.ibm.com/support/pages/node/7258042 | external |
| https://www.ibm.com/support/pages/node/7258025 | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://de.tenable.com/security/tns-2026-02 | external |
| https://linux.oracle.com/errata/ELSA-2026-0932.html | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://www.ibm.com/support/pages/node/7259422 | external |
| https://access.redhat.com/errata/RHSA-2026:1606 | external |
| https://ubuntu.com/security/notices/USN-8003-1 | external |
| https://ubuntu.com/security/notices/USN-8002-1 | external |
| https://ubuntu.com/security/notices/USN-8001-1 | external |
| https://ubuntu.com/security/notices/USN-8000-1 | external |
| https://ubuntu.com/security/notices/USN-7995-1 | external |
| https://ubuntu.com/security/notices/USN-7996-1 | external |
| https://ubuntu.com/security/notices/USN-7997-1 | external |
| https://ubuntu.com/security/notices/USN-7998-1 | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://lists.debian.org/debian-security-announce… | external |
| https://alas.aws.amazon.com/AL2/ALAS2CORRETTO8-20… | external |
| https://alas.aws.amazon.com/AL2/ALAS2-2026-3140.html | external |
| https://alas.aws.amazon.com/AL2/ALAS2-2026-3139.html | external |
| https://linux.oracle.com/errata/ELSA-2026-0931.html | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://errata.build.resf.org/RLSA-2026:0933 | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://www.ibm.com/support/pages/node/7261060 | external |
| https://www.hitachi.com/products/it/software/secu… | external |
| https://alas.aws.amazon.com/AL2/ALAS2-2026-3154.html | external |
| https://www.ibm.com/support/pages/node/7261527 | external |
| https://www.ibm.com/support/pages/node/7261783 | external |
| https://www.ibm.com/support/pages/node/7261965 | external |
| https://www.ibm.com/support/pages/node/7262441 | external |
| https://www.dell.com/support/kbdoc/000435907 | external |
| https://www.ibm.com/support/pages/node/7262386 | external |
| https://www.ibm.com/support/pages/node/7262890 | external |
| https://access.redhat.com/errata/RHSA-2026:4832 | external |
| https://www.dell.com/support/kbdoc/de-de/00044324… | external |
| https://lists.suse.com/pipermail/sle-security-upd… | external |
| https://www.ibm.com/support/pages/node/7268144 | external |
| https://www.ibm.com/support/pages/node/7268629 | external |
| https://www.ibm.com/support/pages/node/7259431 | external |
| https://www.ibm.com/support/pages/node/7268732 | external |
| https://www.dell.com/support/kbdoc/000450565 | external |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0164 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0164.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0164 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0164"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - January 2026 - Appendix Oracle Java SE vom 2026-01-20",
"url": "https://www.oracle.com/security-alerts/cpujan2026.html#AppendixJAVA"
},
{
"category": "external",
"summary": "Change Log for Amazon Corretto 8 vom 2026-01-20",
"url": "https://github.com/corretto/corretto-8/blob/8.482.08.1/CHANGELOG.md"
},
{
"category": "external",
"summary": "Change Log for Amazon Corretto 11 vom 2026-01-20",
"url": "https://github.com/corretto/corretto-11/blob/11.0.30.7.1/CHANGELOG.md"
},
{
"category": "external",
"summary": "Azul Zulu builds of OpenJDK - January 2026 Quarterly Update",
"url": "https://docs.azul.com/core/pdfs/january-2026/azul-zulu-ca-release-notes-january-2026-rev1.0.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0848 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0848"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0927 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0927"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0849 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0849"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0847 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0847"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0927 vom 2026-01-22",
"url": "https://linux.oracle.com/errata/ELSA-2026-0927.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0928 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0928"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0927 vom 2026-01-23",
"url": "https://errata.build.resf.org/RLSA-2026:0927"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0928 vom 2026-01-23",
"url": "https://errata.build.resf.org/RLSA-2026:0928"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6110 vom 2026-01-25",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00019.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0928 vom 2026-01-23",
"url": "http://linux.oracle.com/errata/ELSA-2026-0928.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4457 vom 2026-01-26",
"url": "https://lists.debian.org/debian-lts-announce/2026/01/msg00029.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0932 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0932"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0898 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0898"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0897 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0897"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6112 vom 2026-01-27",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00021.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0900 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0900"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4456 vom 2026-01-26",
"url": "https://lists.debian.org/debian-lts-announce/2026/01/msg00028.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0899 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0899"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0901 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0901"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0896 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0896"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0931 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0931"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0895 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0895"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0933 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0933"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0932 vom 2026-01-27",
"url": "https://errata.build.resf.org/RLSA-2026:0932"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7258042 vom 2026-01-26",
"url": "https://www.ibm.com/support/pages/node/7258042"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7258025 vom 2026-01-26",
"url": "https://www.ibm.com/support/pages/node/7258025"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10093-1 vom 2026-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYXZQCWXWQDRW4DHVAGCG2J73SA27W5O/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10091-1 vom 2026-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGS2RS52V5KQQQCEGK24MAXSHABJIWTF/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10092-1 vom 2026-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IWJT2INRPEEFPSE2YAYZEKLRS6UQUNF5/"
},
{
"category": "external",
"summary": "Tenable Security Advisory TNS-2026-02 vom 2026-01-27",
"url": "https://de.tenable.com/security/tns-2026-02"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0932 vom 2026-01-27",
"url": "https://linux.oracle.com/errata/ELSA-2026-0932.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10108-1 vom 2026-01-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S7CDPZVRFL4SBFCJW4WIXCZCXZRWVTTN/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0342-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023990.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0341-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023991.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7259422 vom 2026-02-02",
"url": "https://www.ibm.com/support/pages/node/7259422"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:1606 vom 2026-02-02",
"url": "https://access.redhat.com/errata/RHSA-2026:1606"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8003-1 vom 2026-02-03",
"url": "https://ubuntu.com/security/notices/USN-8003-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8002-1 vom 2026-02-03",
"url": "https://ubuntu.com/security/notices/USN-8002-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8001-1 vom 2026-02-03",
"url": "https://ubuntu.com/security/notices/USN-8001-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8000-1 vom 2026-02-03",
"url": "https://ubuntu.com/security/notices/USN-8000-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7995-1 vom 2026-02-03",
"url": "https://ubuntu.com/security/notices/USN-7995-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7996-1 vom 2026-02-03",
"url": "https://ubuntu.com/security/notices/USN-7996-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7997-1 vom 2026-02-03",
"url": "https://ubuntu.com/security/notices/USN-7997-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7998-1 vom 2026-02-03",
"url": "https://ubuntu.com/security/notices/USN-7998-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20190-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20199-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0363-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024035.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20134-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HBUYV33ZTE6ADPCQZM6HMW2XG7WQETD/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10134-1 vom 2026-02-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4Z3UR6PG63OYY7IV4AAM2MZ4DMWZEWHO/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10136-1 vom 2026-02-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6MZSBZI33V52BT5HAQ2MZPR3L3M5D7EB/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10133-1 vom 2026-02-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISR24KNJXAKOAXEUS5RCDFFCRLEKUVXP/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10135-1 vom 2026-02-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZ5K6IBQB2ADSD26EDHXRFXMJK6DGJSD/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10137-1 vom 2026-02-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDLTBTE6W5WTWIKXD72QA22655BXNXO4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0382-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024059.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20215-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0389-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0390-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024077.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6119 vom 2026-02-05",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00028.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2026-022 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2CORRETTO8-2026-022.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3140 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3140.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3139 vom 2026-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3139.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0931 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-0931.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0415-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024087.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0414-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024088.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0441-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024107.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0933 vom 2026-02-13",
"url": "https://errata.build.resf.org/RLSA-2026:0933"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10204-1 vom 2026-02-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5R4OVWJW7F4TAFLPAQY7LX4HQCY7BJCU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0504-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024244.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7261060 vom 2026-02-17",
"url": "https://www.ibm.com/support/pages/node/7261060"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2026-102 vom 2026-02-18",
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-102/index.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3154 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3154.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7261527 vom 2026-02-23",
"url": "https://www.ibm.com/support/pages/node/7261527"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7261783 vom 2026-02-25",
"url": "https://www.ibm.com/support/pages/node/7261783"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7261965 vom 2026-02-26",
"url": "https://www.ibm.com/support/pages/node/7261965"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7262441 vom 2026-03-03",
"url": "https://www.ibm.com/support/pages/node/7262441"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-101 vom 2026-03-07",
"url": "https://www.dell.com/support/kbdoc/000435907"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7262386 vom 2026-03-06",
"url": "https://www.ibm.com/support/pages/node/7262386"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7262890 vom 2026-03-09",
"url": "https://www.ibm.com/support/pages/node/7262890"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4832 vom 2026-03-17",
"url": "https://access.redhat.com/errata/RHSA-2026:4832"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-152 vom 2026-03-23",
"url": "https://www.dell.com/support/kbdoc/de-de/000443243/dsa-2026-152-dell-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1150-1 vom 2026-03-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025065.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7268144 vom 2026-03-31",
"url": "https://www.ibm.com/support/pages/node/7268144"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7268629 vom 2026-04-06",
"url": "https://www.ibm.com/support/pages/node/7268629"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7259431 vom 2026-02-02",
"url": "https://www.ibm.com/support/pages/node/7259431"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7268732 vom 2026-04-09",
"url": "https://www.ibm.com/support/pages/node/7268732"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-174 vom 2026-04-10",
"url": "https://www.dell.com/support/kbdoc/000450565"
}
],
"source_lang": "en-US",
"title": "Oracle Java SE: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-09T22:00:00.000+00:00",
"generator": {
"date": "2026-04-10T07:15:13.962+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0164",
"initial_release_date": "2026-01-20T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian und Oracle Linux aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian, Red Hat, Rocky Enterprise Software Foundation und IBM aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von openSUSE, Tenable und Oracle Linux aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von IBM, Red Hat und Ubuntu aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE, Debian und Amazon aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-10T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von IBM und IBM-APAR aufgenommen"
},
{
"date": "2026-03-03T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Dell und IBM aufgenommen"
},
{
"date": "2026-03-09T23:00:00.000+00:00",
"number": "24",
"summary": "Referenz(en) aufgenommen: 7262942"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-03-30T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-31T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-04-06T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-04-08T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von IBM und IBM-APAR aufgenommen"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von IBM und Dell aufgenommen"
}
],
"status": "final",
"version": "31"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.482.08.1",
"product": {
"name": "Amazon Corretto \u003c8.482.08.1",
"product_id": "T050211"
}
},
{
"category": "product_version",
"name": "8.482.08.1",
"product": {
"name": "Amazon Corretto 8.482.08.1",
"product_id": "T050211-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:amazon:corretto:8.482.08.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.0.30.7.1",
"product": {
"name": "Amazon Corretto \u003c11.0.30.7.1",
"product_id": "T050212"
}
},
{
"category": "product_version",
"name": "11.0.30.7.1",
"product": {
"name": "Amazon Corretto 11.0.30.7.1",
"product_id": "T050212-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:amazon:corretto:11.0.30.7.1"
}
}
}
],
"category": "product_name",
"name": "Corretto"
},
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Azul Zulu",
"product": {
"name": "Azul Zulu",
"product_id": "T036273",
"product_identification_helper": {
"cpe": "cpe:/a:azul:zulu:-"
}
}
}
],
"category": "vendor",
"name": "Azul"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Data Protection Advisor",
"product": {
"name": "Dell Data Protection Advisor",
"product_id": "T021498",
"product_identification_helper": {
"cpe": "cpe:/a:dell:data_protection_advisor:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "NRE \u003c8.0.28",
"product": {
"name": "Dell NetWorker NRE \u003c8.0.28",
"product_id": "T051479"
}
},
{
"category": "product_version",
"name": "NRE 8.0.28",
"product": {
"name": "Dell NetWorker NRE 8.0.28",
"product_id": "T051479-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:nre__8.0.28"
}
}
},
{
"category": "product_version_range",
"name": "NRE \u003c17.0.4",
"product": {
"name": "Dell NetWorker NRE \u003c17.0.4",
"product_id": "T051480"
}
},
{
"category": "product_version",
"name": "NRE 17.0.4",
"product": {
"name": "Dell NetWorker NRE 17.0.4",
"product_id": "T051480-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:nre__17.0.4"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.34.00.16",
"product": {
"name": "Dell Secure Connect Gateway \u003c5.34.00.16",
"product_id": "T052048"
}
},
{
"category": "product_version",
"name": "5.34.00.16",
"product": {
"name": "Dell Secure Connect Gateway 5.34.00.16",
"product_id": "T052048-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:secure_connect_gateway:5.34.00.16"
}
}
}
],
"category": "product_name",
"name": "Secure Connect Gateway"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Command Suite",
"product": {
"name": "Hitachi Command Suite",
"product_id": "T038839",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:command_suite:-"
}
}
},
{
"category": "product_name",
"name": "Hitachi Configuration Manager",
"product": {
"name": "Hitachi Configuration Manager",
"product_id": "T020304",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:configuration_manager:-"
}
}
},
{
"category": "product_name",
"name": "Hitachi Ops Center",
"product": {
"name": "Hitachi Ops Center",
"product_id": "T017562",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:ops_center:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM App Connect Enterprise",
"product": {
"name": "IBM App Connect Enterprise",
"product_id": "T032495",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:-"
}
}
},
{
"category": "product_version",
"name": "13.0.1.0-13.0.6.1",
"product": {
"name": "IBM App Connect Enterprise 13.0.1.0-13.0.6.1",
"product_id": "T051289",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:13.0.1.0_-_13.0.6.1"
}
}
},
{
"category": "product_version",
"name": "12.0.1.0-12.0.12.22",
"product": {
"name": "IBM App Connect Enterprise 12.0.1.0-12.0.12.22",
"product_id": "T051290",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:12.0.1.0_-_12.0.12.22"
}
}
}
],
"category": "product_name",
"name": "App Connect Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "10.5.0.0-10.5.0.20",
"product": {
"name": "IBM DataPower Gateway 10.5.0.0-10.5.0.20",
"product_id": "T052394",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:10.5.0.0_-_10.5.0.20"
}
}
},
{
"category": "product_version",
"name": "10.6.0.0-10.6.0.8",
"product": {
"name": "IBM DataPower Gateway 10.6.0.0-10.6.0.8",
"product_id": "T052395",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:10.6.0.0_-_10.6.0.8"
}
}
},
{
"category": "product_version",
"name": "10.6.1.0-10.6.6.0",
"product": {
"name": "IBM DataPower Gateway 10.6.1.0-10.6.6.0",
"product_id": "T052396",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:10.6.1.0_-_10.6.6.0"
}
}
}
],
"category": "product_name",
"name": "DataPower Gateway"
},
{
"category": "product_name",
"name": "IBM InfoSphere Information Server",
"product": {
"name": "IBM InfoSphere Information Server",
"product_id": "T035705",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_information_server:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "for z/OS \t10.1.0.0-10.1.0.6",
"product": {
"name": "IBM Integration Bus for z/OS \t10.1.0.0-10.1.0.6",
"product_id": "T051291",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:integration_bus:10.1.0.0_-_10.1.0.6::zos"
}
}
}
],
"category": "product_name",
"name": "Integration Bus"
},
{
"category": "product_name",
"name": "IBM Java SDK",
"product": {
"name": "IBM Java SDK",
"product_id": "10695",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:jdk:-"
}
}
},
{
"category": "product_name",
"name": "IBM Power Hardware Management Console",
"product": {
"name": "IBM Power Hardware Management Console",
"product_id": "5114",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "8.0.302.0-8.0.472.0",
"product": {
"name": "IBM Semeru Runtime 8.0.302.0-8.0.472.0",
"product_id": "T052581",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:semeru_runtime:8.0.302.0_-_8.0.472.0"
}
}
},
{
"category": "product_version",
"name": "11.0.12.0-11.0.29.0",
"product": {
"name": "IBM Semeru Runtime 11.0.12.0-11.0.29.0",
"product_id": "T052582",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:semeru_runtime:11.0.12.0_-_11.0.29.0"
}
}
},
{
"category": "product_version",
"name": "17.0.0.0-17.0.17.0",
"product": {
"name": "IBM Semeru Runtime 17.0.0.0-17.0.17.0",
"product_id": "T052583",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:semeru_runtime:17.0.0.0_-_17.0.17.0"
}
}
},
{
"category": "product_version",
"name": "21.0.0.0-21.0.9.0",
"product": {
"name": "IBM Semeru Runtime 21.0.0.0-21.0.9.0",
"product_id": "T052584",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:semeru_runtime:21.0.0.0_-_21.0.9.0"
}
}
},
{
"category": "product_version",
"name": "25.0.0.0-25.0.1.0",
"product": {
"name": "IBM Semeru Runtime 25.0.0.0-25.0.1.0",
"product_id": "T052585",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:semeru_runtime:25.0.0.0_-_25.0.1.0"
}
}
}
],
"category": "product_name",
"name": "Semeru Runtime"
},
{
"category": "product_name",
"name": "IBM Sterling Connect:Direct",
"product": {
"name": "IBM Sterling Connect:Direct",
"product_id": "T045428",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:sterling_connect%3adirect:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "for Multiplatforms 9.1",
"product": {
"name": "IBM TXSeries for Multiplatforms 9.1",
"product_id": "T015903",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:txseries:for_multiplatforms_9.1"
}
}
},
{
"category": "product_version",
"name": "for Multiplatforms 8.2",
"product": {
"name": "IBM TXSeries for Multiplatforms 8.2",
"product_id": "T015904",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:txseries:for_multiplatforms_8.2"
}
}
},
{
"category": "product_version",
"name": "for Multiplatforms 10.1",
"product": {
"name": "IBM TXSeries for Multiplatforms 10.1",
"product_id": "T037951",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:txseries:for_multiplatforms_10.1"
}
}
},
{
"category": "product_version",
"name": "for Multiplatforms 11.1",
"product": {
"name": "IBM TXSeries for Multiplatforms 11.1",
"product_id": "T043237",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:txseries:for_multiplatforms_11.1"
}
}
}
],
"category": "product_name",
"name": "TXSeries"
},
{
"branches": [
{
"category": "product_version",
"name": "6.2.0",
"product": {
"name": "IBM Tivoli Business Service Manager 6.2.0",
"product_id": "T014092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_business_service_manager:6.2.0"
}
}
}
],
"category": "product_name",
"name": "Tivoli Business Service Manager"
},
{
"branches": [
{
"category": "product_version",
"name": "6.3.0.7",
"product": {
"name": "IBM Tivoli Monitoring 6.3.0.7",
"product_id": "342008",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7"
}
}
}
],
"category": "product_name",
"name": "Tivoli Monitoring"
},
{
"category": "product_name",
"name": "IBM WebSphere Application Server",
"product": {
"name": "IBM WebSphere Application Server",
"product_id": "T000377",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:websphere_application_server:-"
}
}
},
{
"category": "product_name",
"name": "IBM WebSphere Service Registry and Repository",
"product": {
"name": "IBM WebSphere Service Registry and Repository",
"product_id": "T048917",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:websphere_service_registry_and_repository:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source OpenJDK",
"product": {
"name": "Open Source OpenJDK",
"product_id": "580789",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:openjdk:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "for JDK 17.0.17",
"product": {
"name": "Oracle GraalVM for JDK 17.0.17",
"product_id": "T050203",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:graalvm:for_jdk_17.0.17"
}
}
},
{
"category": "product_version",
"name": "for JDK 21.0.9",
"product": {
"name": "Oracle GraalVM for JDK 21.0.9",
"product_id": "T050204",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:graalvm:for_jdk_21.0.9"
}
}
},
{
"category": "product_version",
"name": "Enterprise Edition 21.3.16",
"product": {
"name": "Oracle GraalVM Enterprise Edition 21.3.16",
"product_id": "T050205",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:graalvm:enterprise_edition_21.3.16"
}
}
}
],
"category": "product_name",
"name": "GraalVM"
},
{
"branches": [
{
"category": "product_version",
"name": "11.0.29",
"product": {
"name": "Oracle Java SE 11.0.29",
"product_id": "T050145",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:11.0.29"
}
}
},
{
"category": "product_version",
"name": "17.0.17",
"product": {
"name": "Oracle Java SE 17.0.17",
"product_id": "T050146",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:17.0.17"
}
}
},
{
"category": "product_version",
"name": "21.0.9",
"product": {
"name": "Oracle Java SE 21.0.9",
"product_id": "T050147",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:21.0.9"
}
}
},
{
"category": "product_version",
"name": "8u471-b50",
"product": {
"name": "Oracle Java SE 8u471-b50",
"product_id": "T050199",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:8u471-b50"
}
}
},
{
"category": "product_version",
"name": "8u471",
"product": {
"name": "Oracle Java SE 8u471",
"product_id": "T050200",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:8u471"
}
}
},
{
"category": "product_version",
"name": "8u471-perf",
"product": {
"name": "Oracle Java SE 8u471-perf",
"product_id": "T050201",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:8u471-perf"
}
}
},
{
"category": "product_version",
"name": "25.0.1",
"product": {
"name": "Oracle Java SE 25.0.1",
"product_id": "T050202",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:25.0.1"
}
}
}
],
"category": "product_name",
"name": "Java SE"
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.5.3",
"product": {
"name": "Tenable Security Nessus Network Monitor \u003c6.5.3",
"product_id": "T050330"
}
},
{
"category": "product_version",
"name": "6.5.3",
"product": {
"name": "Tenable Security Nessus Network Monitor 6.5.3",
"product_id": "T050330-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:tenable:nessus_network_monitor:6.5.3"
}
}
}
],
"category": "product_name",
"name": "Nessus Network Monitor"
}
],
"category": "vendor",
"name": "Tenable Security"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-12183",
"product_status": {
"known_affected": [
"T052395",
"T052396",
"T052394",
"T037951",
"T050212",
"T004914",
"T050330",
"T050211",
"T021498",
"T045428",
"T050205",
"10695",
"398363",
"T052582",
"T052583",
"T052581",
"T051290",
"T035705",
"5114",
"T051291",
"T050202",
"T050201",
"T050204",
"T050203",
"T050200",
"T052584",
"T017562",
"T052585",
"T036273",
"T043237",
"2951",
"T002207",
"T027843",
"T051480",
"T015904",
"T015903",
"67646",
"T051289",
"T050199",
"T014092",
"T048917",
"T020304",
"T000377",
"342008",
"T038839",
"T050147",
"T050146",
"T051479",
"T032255",
"T052048",
"T050145",
"T032495",
"T000126",
"580789"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-12183"
},
{
"cve": "CVE-2025-43368",
"product_status": {
"known_affected": [
"T052395",
"T052396",
"T052394",
"T037951",
"T050212",
"T004914",
"T050330",
"T050211",
"T021498",
"T045428",
"T050205",
"10695",
"398363",
"T052582",
"T052583",
"T052581",
"T051290",
"T035705",
"5114",
"T051291",
"T050202",
"T050201",
"T050204",
"T050203",
"T050200",
"T052584",
"T017562",
"T052585",
"T036273",
"T043237",
"2951",
"T002207",
"T027843",
"T051480",
"T015904",
"T015903",
"67646",
"T051289",
"T050199",
"T014092",
"T048917",
"T020304",
"T000377",
"342008",
"T038839",
"T050147",
"T050146",
"T051479",
"T032255",
"T052048",
"T050145",
"T032495",
"T000126",
"580789"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-43368"
},
{
"cve": "CVE-2025-47219",
"product_status": {
"known_affected": [
"T052395",
"T052396",
"T052394",
"T037951",
"T050212",
"T004914",
"T050330",
"T050211",
"T021498",
"T045428",
"T050205",
"10695",
"398363",
"T052582",
"T052583",
"T052581",
"T051290",
"T035705",
"5114",
"T051291",
"T050202",
"T050201",
"T050204",
"T050203",
"T050200",
"T052584",
"T017562",
"T052585",
"T036273",
"T043237",
"2951",
"T002207",
"T027843",
"T051480",
"T015904",
"T015903",
"67646",
"T051289",
"T050199",
"T014092",
"T048917",
"T020304",
"T000377",
"342008",
"T038839",
"T050147",
"T050146",
"T051479",
"T032255",
"T052048",
"T050145",
"T032495",
"T000126",
"580789"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-47219"
},
{
"cve": "CVE-2025-6021",
"product_status": {
"known_affected": [
"T052395",
"T052396",
"T052394",
"T037951",
"T050212",
"T004914",
"T050330",
"T050211",
"T021498",
"T045428",
"T050205",
"10695",
"398363",
"T052582",
"T052583",
"T052581",
"T051290",
"T035705",
"5114",
"T051291",
"T050202",
"T050201",
"T050204",
"T050203",
"T050200",
"T052584",
"T017562",
"T052585",
"T036273",
"T043237",
"2951",
"T002207",
"T027843",
"T051480",
"T015904",
"T015903",
"67646",
"T051289",
"T050199",
"T014092",
"T048917",
"T020304",
"T000377",
"342008",
"T038839",
"T050147",
"T050146",
"T051479",
"T032255",
"T052048",
"T050145",
"T032495",
"T000126",
"580789"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-6021"
},
{
"cve": "CVE-2025-6052",
"product_status": {
"known_affected": [
"T052395",
"T052396",
"T052394",
"T037951",
"T050212",
"T004914",
"T050330",
"T050211",
"T021498",
"T045428",
"T050205",
"10695",
"398363",
"T052582",
"T052583",
"T052581",
"T051290",
"T035705",
"5114",
"T051291",
"T050202",
"T050201",
"T050204",
"T050203",
"T050200",
"T052584",
"T017562",
"T052585",
"T036273",
"T043237",
"2951",
"T002207",
"T027843",
"T051480",
"T015904",
"T015903",
"67646",
"T051289",
"T050199",
"T014092",
"T048917",
"T020304",
"T000377",
"342008",
"T038839",
"T050147",
"T050146",
"T051479",
"T032255",
"T052048",
"T050145",
"T032495",
"T000126",
"580789"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-6052"
},
{
"cve": "CVE-2025-7425",
"product_status": {
"known_affected": [
"T052395",
"T052396",
"T052394",
"T037951",
"T050212",
"T004914",
"T050330",
"T050211",
"T021498",
"T045428",
"T050205",
"10695",
"398363",
"T052582",
"T052583",
"T052581",
"T051290",
"T035705",
"5114",
"T051291",
"T050202",
"T050201",
"T050204",
"T050203",
"T050200",
"T052584",
"T017562",
"T052585",
"T036273",
"T043237",
"2951",
"T002207",
"T027843",
"T051480",
"T015904",
"T015903",
"67646",
"T051289",
"T050199",
"T014092",
"T048917",
"T020304",
"T000377",
"342008",
"T038839",
"T050147",
"T050146",
"T051479",
"T032255",
"T052048",
"T050145",
"T032495",
"T000126",
"580789"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2025-7425"
},
{
"cve": "CVE-2026-21925",
"product_status": {
"known_affected": [
"T052395",
"T052396",
"T052394",
"T037951",
"T050212",
"T004914",
"T050330",
"T050211",
"T021498",
"T045428",
"T050205",
"10695",
"398363",
"T052582",
"T052583",
"T052581",
"T051290",
"T035705",
"5114",
"T051291",
"T050202",
"T050201",
"T050204",
"T050203",
"T050200",
"T052584",
"T017562",
"T052585",
"T036273",
"T043237",
"2951",
"T002207",
"T027843",
"T051480",
"T015904",
"T015903",
"67646",
"T051289",
"T050199",
"T014092",
"T048917",
"T020304",
"T000377",
"342008",
"T038839",
"T050147",
"T050146",
"T051479",
"T032255",
"T052048",
"T050145",
"T032495",
"T000126",
"580789"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2026-21925"
},
{
"cve": "CVE-2026-21932",
"product_status": {
"known_affected": [
"T052395",
"T052396",
"T052394",
"T037951",
"T050212",
"T004914",
"T050330",
"T050211",
"T021498",
"T045428",
"T050205",
"10695",
"398363",
"T052582",
"T052583",
"T052581",
"T051290",
"T035705",
"5114",
"T051291",
"T050202",
"T050201",
"T050204",
"T050203",
"T050200",
"T052584",
"T017562",
"T052585",
"T036273",
"T043237",
"2951",
"T002207",
"T027843",
"T051480",
"T015904",
"T015903",
"67646",
"T051289",
"T050199",
"T014092",
"T048917",
"T020304",
"T000377",
"342008",
"T038839",
"T050147",
"T050146",
"T051479",
"T032255",
"T052048",
"T050145",
"T032495",
"T000126",
"580789"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2026-21932"
},
{
"cve": "CVE-2026-21933",
"product_status": {
"known_affected": [
"T052395",
"T052396",
"T052394",
"T037951",
"T050212",
"T004914",
"T050330",
"T050211",
"T021498",
"T045428",
"T050205",
"10695",
"398363",
"T052582",
"T052583",
"T052581",
"T051290",
"T035705",
"5114",
"T051291",
"T050202",
"T050201",
"T050204",
"T050203",
"T050200",
"T052584",
"T017562",
"T052585",
"T036273",
"T043237",
"2951",
"T002207",
"T027843",
"T051480",
"T015904",
"T015903",
"67646",
"T051289",
"T050199",
"T014092",
"T048917",
"T020304",
"T000377",
"342008",
"T038839",
"T050147",
"T050146",
"T051479",
"T032255",
"T052048",
"T050145",
"T032495",
"T000126",
"580789"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2026-21933"
},
{
"cve": "CVE-2026-21945",
"product_status": {
"known_affected": [
"T052395",
"T052396",
"T052394",
"T037951",
"T050212",
"T004914",
"T050330",
"T050211",
"T021498",
"T045428",
"T050205",
"10695",
"398363",
"T052582",
"T052583",
"T052581",
"T051290",
"T035705",
"5114",
"T051291",
"T050202",
"T050201",
"T050204",
"T050203",
"T050200",
"T052584",
"T017562",
"T052585",
"T036273",
"T043237",
"2951",
"T002207",
"T027843",
"T051480",
"T015904",
"T015903",
"67646",
"T051289",
"T050199",
"T014092",
"T048917",
"T020304",
"T000377",
"342008",
"T038839",
"T050147",
"T050146",
"T051479",
"T032255",
"T052048",
"T050145",
"T032495",
"T000126",
"580789"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2026-21945"
},
{
"cve": "CVE-2026-21947",
"product_status": {
"known_affected": [
"T052395",
"T052396",
"T052394",
"T037951",
"T050212",
"T004914",
"T050330",
"T050211",
"T021498",
"T045428",
"T050205",
"10695",
"398363",
"T052582",
"T052583",
"T052581",
"T051290",
"T035705",
"5114",
"T051291",
"T050202",
"T050201",
"T050204",
"T050203",
"T050200",
"T052584",
"T017562",
"T052585",
"T036273",
"T043237",
"2951",
"T002207",
"T027843",
"T051480",
"T015904",
"T015903",
"67646",
"T051289",
"T050199",
"T014092",
"T048917",
"T020304",
"T000377",
"342008",
"T038839",
"T050147",
"T050146",
"T051479",
"T032255",
"T052048",
"T050145",
"T032495",
"T000126",
"580789"
]
},
"release_date": "2026-01-20T23:00:00.000+00:00",
"title": "CVE-2026-21947"
}
]
}
GHSA-99RJ-3595-5FRJ
Vulnerability from github – Published: 2025-06-13 18:30 – Updated: 2026-05-12 15:30A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.
{
"affected": [],
"aliases": [
"CVE-2025-6052"
],
"database_specific": {
"cwe_ids": [
"CWE-190"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-06-13T16:15:28Z",
"severity": "LOW"
},
"details": "A flaw was found in how GLib\u2019s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u2019t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.",
"id": "GHSA-99rj-3595-5frj",
"modified": "2026-05-12T15:30:52Z",
"published": "2025-06-13T18:30:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6052"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-6052"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372666"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-032379.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2025-6052
Vulnerability from fkie_nvd - Published: 2025-06-13 16:15 - Updated: 2026-05-12 13:177.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2025-6052 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2372666 | Issue Tracking, Third Party Advisory | |
| 0b142b55-0307-4c5a-b3c9-f314f3fb7c5e | https://cert-portal.siemens.com/productcert/html/ssa-032379.html |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E728915-6D6F-42BB-95CC-D1B6F6B2DDED",
"versionEndIncluding": "2.84.3",
"versionStartIncluding": "2.75.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in how GLib\u2019s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u2019t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en la gesti\u00f3n de memoria de GString de GLib al a\u00f1adir datos a cadenas. Si una cadena ya es muy grande, combinarla con m\u00e1s datos puede causar un desbordamiento oculto en el c\u00e1lculo del tama\u00f1o. Esto hace que el sistema piense que tiene suficiente memoria cuando no la tiene. Como resultado, los datos pueden escribirse m\u00e1s all\u00e1 del l\u00edmite de memoria asignada, lo que provoca fallos o corrupci\u00f3n de memoria."
}
],
"id": "CVE-2025-6052",
"lastModified": "2026-05-12T13:17:28.307",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4,
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-06-13T16:15:28.230",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-6052"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372666"
},
{
"source": "0b142b55-0307-4c5a-b3c9-f314f3fb7c5e",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-032379.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
bit-jre-2025-6052
Vulnerability from bitnami_vulndb
A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "jre",
"purl": "pkg:bitnami/jre"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.8.0"
},
{
"introduced": "1.9.0"
},
{
"fixed": "8.0.481"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2025-6052"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:bellsoft:libericajre:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "A flaw was found in how GLib\u2019s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u2019t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.",
"id": "BIT-jre-2025-6052",
"modified": "2026-05-13T12:07:18.771Z",
"published": "2026-05-08T05:47:27.428Z",
"references": [
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-6052"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372666"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6052"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-032379.html"
}
],
"schema_version": "1.6.2",
"summary": "Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring"
}
bit-java-2025-6052
Vulnerability from bitnami_vulndb
A flaw was found in how GLib’s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn’t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "java",
"purl": "pkg:bitnami/java"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.8.0"
},
{
"introduced": "1.9.0"
},
{
"fixed": "8.0.481"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2025-6052"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:bellsoft:libericajdk:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "A flaw was found in how GLib\u2019s GString manages memory when adding data to strings. If a string is already very large, combining it with more input can cause a hidden overflow in the size calculation. This makes the system think it has enough memory when it doesn\u2019t. As a result, data may be written past the end of the allocated memory, leading to crashes or memory corruption.",
"id": "BIT-java-2025-6052",
"modified": "2026-05-13T12:07:18.771Z",
"published": "2026-05-06T14:45:45.337Z",
"references": [
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-6052"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372666"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6052"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-032379.html"
}
],
"schema_version": "1.6.2",
"summary": "Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring"
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.