wid-sec-w-2025-1569
Vulnerability from csaf_certbund
Published
2025-07-15 22:00
Modified
2025-10-21 22:00
Summary
Oracle Java SE: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Java SE und anderen Java Editionen ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Java SE und anderen Java Editionen ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1569 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1569.json" }, { "category": "self", "summary": "WID-SEC-2025-1569 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1569" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2025 - Appendix Oracle Java SE vom 2025-07-15", "url": "https://www.oracle.com/security-alerts/cpujul2025.html#AppendixJAVA" }, { "category": "external", "summary": "Azul Zulu Builds of OpenJDK July 2025 quarterly update", "url": "https://docs.azul.com/core/pdfs/july-2025/azul-zulu-ca-release-notes-july-2025-rev1.0.pdf" }, { "category": "external", "summary": "OpenJDK Vulnerability Advisory: 2025/07/15", "url": "https://openjdk.org/groups/vulnerability/advisories/2025-07-15" }, { "category": "external", "summary": "Corretto 8 Changelog vom 2025-07-16", "url": "https://github.com/corretto/corretto-8/blob/8.462.08.1/CHANGELOG.md" }, { "category": "external", "summary": "Corretto 11 ChangeLog vom 2025-07-16", "url": "https://github.com/corretto/corretto-11/blob/11.0.28.6.1/CHANGELOG.md" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10867 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:10867" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10873 vom 2025-07-16", "url": "https://access.redhat.com/errata/RHSA-2025:10873" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-10867 vom 2025-07-16", "url": "https://linux.oracle.com/errata/ELSA-2025-10867.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10863 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:10863" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10875 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:10875" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10874 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:10874" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10870 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:10870" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10861 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:10861" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10869 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:10869" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10864 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:10864" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10862 vom 2025-07-17", "url": "https://access.redhat.com/errata/RHSA-2025:10862" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15358-1 vom 2025-07-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/453Q2ZG7DSLGSOQSRYVDHQWSHZKLPFSY/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10865 vom 2025-07-21", "url": "https://access.redhat.com/errata/RHSA-2025:10865" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15357-1 vom 2025-07-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNGLPZCSINE52RXS4WUK4V3G23AG77LX/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10866 vom 2025-07-21", "url": "https://access.redhat.com/errata/RHSA-2025:10866" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10868 vom 2025-07-21", "url": "https://access.redhat.com/errata/RHSA-2025:10868" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15362-1 vom 2025-07-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VVXHASFDSYT4YOX6UDCB7YID22NCJ66G/" }, { "category": "external", "summary": "Debian Security Advisory DLA-4248 vom 2025-07-23", "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00011.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7668-1 vom 2025-07-25", "url": "https://ubuntu.com/security/notices/USN-7668-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7669-1 vom 2025-07-25", "url": "https://ubuntu.com/security/notices/USN-7669-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7672-1 vom 2025-07-28", "url": "https://ubuntu.com/security/notices/USN-7672-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7673-1 vom 2025-07-28", "url": "https://ubuntu.com/security/notices/USN-7673-1" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15390-1 vom 2025-07-28", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7H7XWA5W6BW245PBOIWOLBE2BLEIN6FI/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7674-1 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7674-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7667-1 vom 2025-07-29", "url": "https://ubuntu.com/security/notices/USN-7667-1" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15391-1 vom 2025-07-28", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3YGILFYUGSJBMX6XUS3DCORELUTENSOY/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15392-1 vom 2025-07-28", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2BNOLDILAQY4FCCIW4HNDPZ7EHWJ3XM5/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-10862 vom 2025-07-29", "url": "https://linux.oracle.com/errata/ELSA-2025-10862.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02545-1 vom 2025-07-30", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021987.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-10873 vom 2025-07-30", "url": "http://linux.oracle.com/errata/ELSA-2025-10873.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2940 vom 2025-07-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2940.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2936 vom 2025-07-30", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2936.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02563-1 vom 2025-07-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021993.html" }, { "category": "external", "summary": "IBM Security Bulletin 7241226 vom 2025-07-31", "url": "https://www.ibm.com/support/pages/node/7241226" }, { "category": "external", "summary": "IBM Security Bulletin 7241306 vom 2025-08-01", "url": "https://www.ibm.com/support/pages/node/7241306" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2025-2956 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2956.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2025-020 vom 2025-08-05", "url": "https://alas.aws.amazon.com/AL2/ALAS2CORRETTO8-2025-020.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02657-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TO75LIYWPLPTZF6IA3K6IZNLY4O5NFM7/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02666-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DULM7FV7WTXEDWKUTXKMNK2TCHADYPSC/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:02667-1 vom 2025-08-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCCQGVXFXURHFPSAYKM7LURL37W2CYIM/" }, { "category": "external", "summary": "IBM Security Bulletin 7241769 vom 2025-08-07", "url": "https://www.ibm.com/support/pages/node/7241769" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-10861 vom 2025-08-09", "url": "https://linux.oracle.com/errata/ELSA-2025-10861.html" }, { "category": "external", "summary": "IBM Security Bulletin 7241933 vom 2025-08-11", "url": "https://www.ibm.com/support/pages/node/7241933" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13656 vom 2025-08-11", "url": "https://access.redhat.com/errata/RHSA-2025:13656" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7690-1 vom 2025-08-12", "url": "https://ubuntu.com/security/notices/USN-7690-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:13675 vom 2025-08-12", "url": "https://access.redhat.com/errata/RHSA-2025:13675" }, { "category": "external", "summary": "Debian Security Advisory DSA-5972 vom 2025-08-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00136.html" }, { "category": "external", "summary": "IBM Security Bulletin 7242133 vom 2025-08-14", "url": "https://www.ibm.com/support/pages/node/7242133" }, { "category": "external", "summary": "Debian Security Advisory DLA-4275 vom 2025-08-19", "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00014.html" }, { "category": "external", "summary": "IGEL Security Notice ISN-2025-35 vom 2025-08-21", "url": "https://kb.igel.com/en/security-safety/current/isn-2025-35-jre-vulnerabilities" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2025-124 vom 2025-08-26", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2025-124/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 7243515 vom 2025-08-28", "url": "https://www.ibm.com/support/pages/node/7243515" }, { "category": "external", "summary": "IBM Security Bulletin 7243787 vom 2025-09-02", "url": "https://www.ibm.com/support/pages/node/7243787" }, { "category": "external", "summary": "IBM Security Bulletin 7243803 vom 2025-09-02", "url": "https://www.ibm.com/support/pages/node/7243803" }, { "category": "external", "summary": "IBM Security Bulletin 7243800 vom 2025-09-04", "url": "https://www.ibm.com/support/pages/node/7243800" }, { "category": "external", "summary": "IBM Security Bulletin 7243799 vom 2025-09-04", "url": "https://www.ibm.com/support/pages/node/7243799" }, { "category": "external", "summary": "IBM Security Bulletin 7244160 vom 2025-09-05", "url": "https://www.ibm.com/support/pages/node/7244160" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03120-1 vom 2025-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022416.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15532-1 vom 2025-09-09", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BPULRW22JDBFXFG4VNIAA3WAVA5VFPSU/" }, { "category": "external", "summary": "IBM Security Bulletin 7244391 vom 2025-09-09", "url": "https://www.ibm.com/support/pages/node/7244391" }, { "category": "external", "summary": "IBM Security Bulletin", "url": "https://www.ibm.com/support/pages/node/7244394" }, { "category": "external", "summary": "IBM Security Bulletin 7244609 vom 2025-09-11", "url": "https://www.ibm.com/support/pages/node/7244609" }, { "category": "external", "summary": "IBM Security Bulletin 7244648 vom 2025-09-11", "url": "https://www.ibm.com/support/pages/node/7244648" }, { "category": "external", "summary": "IBM Security Bulletin 7244651 vom 2025-09-11", "url": "https://www.ibm.com/support/pages/node/7244651" }, { "category": "external", "summary": "IBM Security Bulletin 7244768 vom 2025-09-12", "url": "https://www.ibm.com/support/pages/node/7244768" }, { "category": "external", "summary": "IBM Security Bulletin 7244657 vom 2025-09-12", "url": "https://www.ibm.com/support/pages/node/7244657" }, { "category": "external", "summary": "IBM Security Bulletin 7244879 vom 2025-09-12", "url": "https://www.ibm.com/support/pages/node/7244879" }, { "category": "external", "summary": "IBM Security Bulletin 7244987 vom 2025-09-15", "url": "https://www.ibm.com/support/pages/node/7244987" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03224-1 vom 2025-09-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022539.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:0351-1 vom 2025-09-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46ENDY2NXGQLZC2JZ3BI2AUCKYOSA4PX/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:0354-1 vom 2025-09-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZDNEL7E26VA3OBDQFDUUZTHUQ6VD5VR/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:0353-1 vom 2025-09-15", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWY4UAD3IUPKXW4ZZBHGX4ITOYVGHP72/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03236-1 vom 2025-09-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022549.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:03262-1 vom 2025-09-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G446YLSI37B5HCBUHPUAGZTFIIWOL5YO/" }, { "category": "external", "summary": "IBM Security Bulletin 7245706 vom 2025-09-22", "url": "https://www.ibm.com/support/pages/node/7245706" }, { "category": "external", "summary": "IBM Security Bulletin 7245993 vom 2025-09-24", "url": "https://www.ibm.com/support/pages/node/7245993" }, { "category": "external", "summary": "HCL Security Bulletin vom 2025-09-25", "url": "https://support.hcl-software.com/csm?id=kb_article\u0026sysparm_article=KB0124270" }, { "category": "external", "summary": "IBM Security Bulletin 7246562 vom 2025-09-29", "url": "https://www.ibm.com/support/pages/node/7246562" }, { "category": "external", "summary": "Absolute Security Information vom 2025-09-30", "url": "https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1410" }, { "category": "external", "summary": "IBM Security Bulletin 7246914 vom 2025-10-01", "url": "https://www.ibm.com/support/pages/node/7246914" }, { "category": "external", "summary": "IBM Security Bulletin 7246872 vom 2025-10-01", "url": "https://www.ibm.com/support/pages/node/7246872" }, { "category": "external", "summary": "IBM Security Bulletin 7246919 vom 2025-10-01", "url": "https://www.ibm.com/support/pages/node/7246919" }, { "category": "external", "summary": "IBM Security Bulletin 7247208 vom 2025-10-06", "url": "https://www.ibm.com/support/pages/node/7247208" }, { "category": "external", "summary": "IBM Security Bulletin 7247207 vom 2025-10-06", "url": "https://www.ibm.com/support/pages/node/7247207" }, { "category": "external", "summary": "IBM Security Bulletin 7247347 vom 2025-10-07", "url": "https://www.ibm.com/support/pages/node/7247347" }, { "category": "external", "summary": "IBM Security Bulletin 7247560 vom 2025-10-09", "url": "https://www.ibm.com/support/pages/node/7247560" }, { "category": "external", "summary": "IBM Security Bulletin 7248118 vom 2025-10-16", "url": "https://www.ibm.com/support/pages/node/7248118" }, { "category": "external", "summary": "IBM Security Bulletin 7247994 vom 2025-10-15", "url": "https://www.ibm.com/support/pages/node/7247994" }, { "category": "external", "summary": "IBM Security Bulletin 7248638 vom 2025-10-21", "url": "https://www.ibm.com/support/pages/node/7248638" } ], "source_lang": "en-US", "title": "Oracle Java SE: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-10-21T22:00:00.000+00:00", "generator": { "date": "2025-10-22T07:53:27.970+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-1569", "initial_release_date": "2025-07-15T22:00:00.000+00:00", "revision_history": [ { "date": "2025-07-15T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2025-07-17T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-20T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von openSUSE und Red Hat aufgenommen" }, { "date": "2025-07-21T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-07-22T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-07-24T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-27T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-07-28T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von openSUSE und Ubuntu aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE und Oracle Linux aufgenommen" }, { "date": "2025-07-30T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-07-31T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-08-03T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-08-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-08-10T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-08-11T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2025-08-12T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-08-13T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-08-18T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-08-21T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von IGEL aufgenommen" }, { "date": "2025-08-26T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2025-08-28T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2025-09-02T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-09-04T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-09-07T22:00:00.000+00:00", "number": "26", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-09-09T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von SUSE, openSUSE und IBM aufgenommen" }, { "date": "2025-09-10T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-09-11T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-09-14T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-09-15T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von IBM, SUSE und openSUSE aufgenommen" }, { "date": "2025-09-16T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-17T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-09-21T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-09-24T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-09-25T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2025-09-29T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-09-30T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates aufgenommen" }, { "date": "2025-10-01T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-10-06T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-10-07T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-10-09T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-10-15T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-10-21T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "44" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Server \u003c14.10", "product": { "name": "Absolute Secure Access Server \u003c14.10", "product_id": "T047275" } }, { "category": "product_version", "name": "Server 14.10", "product": { "name": "Absolute Secure Access Server 14.10", "product_id": "T047275-fixed", "product_identification_helper": { "cpe": "cpe:/a:absolute:secure_access:server__14.10" } } }, { "category": "product_version_range", "name": "Insights \u003c4.30", "product": { "name": "Absolute Secure Access Insights \u003c4.30", "product_id": "T047276" } }, { "category": "product_version", "name": "Insights 4.30", "product": { "name": "Absolute Secure Access Insights 4.30", "product_id": "T047276-fixed", "product_identification_helper": { "cpe": "cpe:/a:absolute:secure_access:insights__4.30" } } } ], "category": "product_name", "name": "Secure Access" } ], "category": "vendor", "name": "Absolute" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c8.462.08.1", "product": { "name": "Amazon Corretto \u003c8.462.08.1", "product_id": "T045421" } }, { "category": "product_version", "name": "8.462.08.1", "product": { "name": "Amazon Corretto 8.462.08.1", "product_id": "T045421-fixed", "product_identification_helper": { "cpe": "cpe:/a:amazon:corretto:8.462.08.1" } } }, { "category": "product_version_range", "name": "\u003c11.0.28.6.1", "product": { "name": "Amazon Corretto \u003c11.0.28.6.1", "product_id": "T045422" } }, { "category": "product_version", "name": "11.0.28.6.1", "product": { "name": "Amazon Corretto 11.0.28.6.1", "product_id": "T045422-fixed", "product_identification_helper": { "cpe": "cpe:/a:amazon:corretto:11.0.28.6.1" } } } ], "category": "product_name", "name": "Corretto" }, { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Azul Zulu", "product": { "name": "Azul Zulu", "product_id": "T036273", "product_identification_helper": { "cpe": "cpe:/a:azul:zulu:-" } } } ], "category": "vendor", "name": "Azul" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "HCL BigFix", "product": { "name": "HCL BigFix", "product_id": "T036271", "product_identification_helper": { "cpe": "cpe:/a:hcltech:bigfix:inventory" } } } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "category": "product_name", "name": "Hitachi Command Suite", "product": { "name": "Hitachi Command Suite", "product_id": "T038839", "product_identification_helper": { "cpe": "cpe:/a:hitachi:command_suite:-" } } }, { "category": "product_name", "name": "Hitachi Configuration Manager", "product": { "name": "Hitachi Configuration Manager", "product_id": "T020304", "product_identification_helper": { "cpe": "cpe:/a:hitachi:configuration_manager:-" } } }, { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "IBM App Connect Enterprise", "product": { "name": "IBM App Connect Enterprise", "product_id": "T032495", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:-" } } }, { "category": "product_name", "name": "IBM Business Automation Workflow", "product": { "name": "IBM Business Automation Workflow", "product_id": "T043411", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:-" } } }, { "branches": [ { "category": "product_version", "name": "11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } } ], "category": "product_name", "name": "InfoSphere Information Server" }, { "branches": [ { "category": "product_version", "name": "1.4-1.9.3.2", "product": { "name": "IBM Installation Manager 1.4-1.9.3.2", "product_id": "T046590", "product_identification_helper": { "cpe": "cpe:/a:ibm:installation_manager:1.4_-_1.9.3.2" } } }, { "category": "product_version", "name": "1.4-1.10.1.2", "product": { "name": "IBM Installation Manager 1.4-1.10.1.2", "product_id": "T046975", "product_identification_helper": { "cpe": "cpe:/a:ibm:installation_manager:1.4_-_1.10.1.2" } } } ], "category": "product_name", "name": "Installation Manager" }, { "category": "product_name", "name": "IBM Integration Bus", "product": { "name": "IBM Integration Bus", "product_id": "T011169", "product_identification_helper": { "cpe": "cpe:/a:ibm:integration_bus:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c8.0.8.50", "product": { "name": "IBM Java \u003c8.0.8.50", "product_id": "T045831" } }, { "category": "product_version", "name": "8.0.8.50", "product": { "name": "IBM Java 8.0.8.50", "product_id": "T045831-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:jre:8.0.8.50" } } } ], "category": "product_name", "name": "Java" }, { "category": "product_name", "name": "IBM License Metric Tool", "product": { "name": "IBM License Metric Tool", "product_id": "T029071", "product_identification_helper": { "cpe": "cpe:/a:ibm:license_metric_tool:-" } } }, { "branches": [ { "category": "product_version", "name": "Operator", "product": { "name": "IBM MQ Operator", "product_id": "T036688", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:operator" } } }, { "category": "product_version", "name": "Container", "product": { "name": "IBM MQ Container", "product_id": "T040640", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:container" } } }, { "category": "product_version_range", "name": "\u003c9.1.0.31", "product": { "name": "IBM MQ \u003c9.1.0.31", "product_id": "T046724" } }, { "category": "product_version", "name": "9.1.0.31", "product": { "name": "IBM MQ 9.1.0.31", "product_id": "T046724-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:9.1.0.31" } } }, { "category": "product_version_range", "name": "\u003c9.2.0.37", "product": { "name": "IBM MQ \u003c9.2.0.37", "product_id": "T046725" } }, { "category": "product_version", "name": "9.2.0.37", "product": { "name": "IBM MQ 9.2.0.37", "product_id": "T046725-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:9.2.0.37" } } }, { "category": "product_version_range", "name": "\u003c9.3.0.31", "product": { "name": "IBM MQ \u003c9.3.0.31", "product_id": "T046726" } }, { "category": "product_version", "name": "9.3.0.31", "product": { "name": "IBM MQ 9.3.0.31", "product_id": "T046726-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:9.3.0.31" } } }, { "category": "product_version_range", "name": "\u003c9.4.0.15", "product": { "name": "IBM MQ \u003c9.4.0.15", "product_id": "T046727" } }, { "category": "product_version", "name": "9.4.0.15", "product": { "name": "IBM MQ 9.4.0.15", "product_id": "T046727-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:9.4.0.15" } } }, { "category": "product_version_range", "name": "\u003c9.4.3.1", "product": { "name": "IBM MQ \u003c9.4.3.1", "product_id": "T046728" } }, { "category": "product_version", "name": "9.4.3.1", "product": { "name": "IBM MQ 9.4.3.1", "product_id": "T046728-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:9.4.3.1" } } } ], "category": "product_name", "name": "MQ" }, { "branches": [ { "category": "product_version", "name": "9.6", "product": { "name": "IBM Rational Application Developer for WebSphere Software 9.6", "product_id": "T012259", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_application_developer_for_websphere_software:9.6" } } }, { "category": "product_version", "name": "9.7", "product": { "name": "IBM Rational Application Developer for WebSphere Software 9.7", "product_id": "T033489", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_application_developer_for_websphere_software:9.7" } } }, { "category": "product_version", "name": "10", "product": { "name": "IBM Rational Application Developer for WebSphere Software 10.0", "product_id": "T047534", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_application_developer_for_websphere_software:10.0" } } } ], "category": "product_name", "name": "Rational Application Developer for WebSphere Software" }, { "category": "product_name", "name": "IBM Rational Business Developer", "product": { "name": "IBM Rational Business Developer", "product_id": "T025611", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_business_developer:-" } } }, { "branches": [ { "category": "product_version", "name": "Collaboration and Deployment Services 8.5", "product": { "name": "IBM SPSS Collaboration and Deployment Services 8.5", "product_id": "T038750", "product_identification_helper": { "cpe": "cpe:/a:ibm:spss:collaboration_and_deployment_services_8.5" } } }, { "category": "product_version", "name": "Statistics", "product": { "name": "IBM SPSS Statistics", "product_id": "T045525", "product_identification_helper": { "cpe": "cpe:/a:ibm:spss:statistics" } } }, { "category": "product_version", "name": "Collaboration and Deployment Services 8.6", "product": { "name": "IBM SPSS Collaboration and Deployment Services 8.6", "product_id": "T046466", "product_identification_helper": { "cpe": "cpe:/a:ibm:spss:collaboration_and_deployment_services_8.6" } } } ], "category": "product_name", "name": "SPSS" }, { "branches": [ { "category": "product_version_range", "name": "\u003c8.0.462.0", "product": { "name": "IBM Semeru Runtime \u003c8.0.462.0", "product_id": "T045792" } }, { "category": "product_version", "name": "8.0.462.0", "product": { "name": "IBM Semeru Runtime 8.0.462.0", "product_id": "T045792-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:semeru_runtime:8.0.462.0" } } }, { "category": "product_version_range", "name": "\u003c11.0.28.0", "product": { "name": "IBM Semeru Runtime \u003c11.0.28.0", "product_id": "T045793" } }, { "category": "product_version", "name": "11.0.28.0", "product": { "name": "IBM Semeru Runtime 11.0.28.0", "product_id": "T045793-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:semeru_runtime:11.0.28.0" } } }, { "category": "product_version_range", "name": "\u003c17.0.16.0", "product": { "name": "IBM Semeru Runtime \u003c17.0.16.0", "product_id": "T045794" } }, { "category": "product_version", "name": "17.0.16.0", "product": { "name": "IBM Semeru Runtime 17.0.16.0", "product_id": "T045794-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:semeru_runtime:17.0.16.0" } } }, { "category": "product_version_range", "name": "\u003c21.0.8.0", "product": { "name": "IBM Semeru Runtime \u003c21.0.8.0", "product_id": "T045795" } }, { "category": "product_version", "name": "21.0.8.0", "product": { "name": "IBM Semeru Runtime 21.0.8.0", "product_id": "T045795-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:semeru_runtime:21.0.8.0" } } } ], "category": "product_name", "name": "Semeru Runtime" }, { "branches": [ { "category": "product_version_range", "name": "\u003c6.3.0.6", "product": { "name": "IBM Sterling Connect:Direct \u003c6.3.0.6", "product_id": "T047329" } }, { "category": "product_version", "name": "6.3.0.6", "product": { "name": "IBM Sterling Connect:Direct 6.3.0.6", "product_id": "T047329-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.3.0.6" } } }, { "category": "product_version_range", "name": "\u003c6.4.0.3", "product": { "name": "IBM Sterling Connect:Direct \u003c6.4.0.3", "product_id": "T047330" } }, { "category": "product_version", "name": "6.4.0.3", "product": { "name": "IBM Sterling Connect:Direct 6.4.0.3", "product_id": "T047330-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.4.0.3" } } }, { "category": "product_version_range", "name": "\u003c6.2.0.9", "product": { "name": "IBM Sterling Connect:Direct \u003c6.2.0.9", "product_id": "T047331" } }, { "category": "product_version", "name": "6.2.0.9", "product": { "name": "IBM Sterling Connect:Direct 6.2.0.9", "product_id": "T047331-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.2.0.9" } } }, { "category": "product_version_range", "name": "\u003c6.2.0.8", "product": { "name": "IBM Sterling Connect:Direct \u003c6.2.0.8", "product_id": "T047347" } }, { "category": "product_version", "name": "6.2.0.8", "product": { "name": "IBM Sterling Connect:Direct 6.2.0.8", "product_id": "T047347-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.2.0.8" } } }, { "category": "product_version_range", "name": "\u003c6.2.0.29", "product": { "name": "IBM Sterling Connect:Direct \u003c6.2.0.29", "product_id": "T047720" } }, { "category": "product_version", "name": "6.2.0.29", "product": { "name": "IBM Sterling Connect:Direct 6.2.0.29", "product_id": "T047720-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.2.0.29" } } }, { "category": "product_version_range", "name": "\u003c6.3.0.15", "product": { "name": "IBM Sterling Connect:Direct \u003c6.3.0.15", "product_id": "T047721" } }, { "category": "product_version", "name": "6.3.0.15", "product": { "name": "IBM Sterling Connect:Direct 6.3.0.15", "product_id": "T047721-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.3.0.15" } } }, { "category": "product_version_range", "name": "\u003c6.4.0.4", "product": { "name": "IBM Sterling Connect:Direct \u003c6.4.0.4", "product_id": "T047722" } }, { "category": "product_version", "name": "6.4.0.4", "product": { "name": "IBM Sterling Connect:Direct 6.4.0.4", "product_id": "T047722-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.4.0.4" } } } ], "category": "product_name", "name": "Sterling Connect:Direct" }, { "branches": [ { "category": "product_version", "name": "for multiplatforms", "product": { "name": "IBM TXSeries for multiplatforms", "product_id": "T036617", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms" } } } ], "category": "product_name", "name": "TXSeries" }, { "branches": [ { "category": "product_version", "name": "6.2.0.0-6.2.0.6", "product": { "name": "IBM Tivoli Business Service Manager 6.2.0.0-6.2.0.6", "product_id": "T046988", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_business_service_manager:6.2.0.0_-_6.2.0.6" } } } ], "category": "product_name", "name": "Tivoli Business Service Manager" }, { "category": "product_name", "name": "IBM Tivoli Key Lifecycle Manager", "product": { "name": "IBM Tivoli Key Lifecycle Manager", "product_id": "T026238", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_key_lifecycle_manager:-" } } }, { "branches": [ { "category": "product_version", "name": "for Virtual Environments 7.3.7", "product": { "name": "IBM Tivoli Monitoring for Virtual Environments 7.3.7", "product_id": "T041162", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:for_virtual_environments__7.3.7" } } }, { "category": "product_version", "name": "6.3.0.7", "product": { "name": "IBM Tivoli Monitoring 6.3.0.7", "product_id": "T046655", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7" } } }, { "category": "product_version", "name": "7.2.10", "product": { "name": "IBM Tivoli Monitoring 7.2.10", "product_id": "T046945", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:7.2.10" } } } ], "category": "product_name", "name": "Tivoli Monitoring" }, { "branches": [ { "category": "product_version", "name": "8.1.0", "product": { "name": "IBM Tivoli Netcool/OMNIbus 8.1.0", "product_id": "700367", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_netcool%2fomnibus:8.1.0" } } } ], "category": "product_name", "name": "Tivoli Netcool/OMNIbus" }, { "category": "product_name", "name": "IBM Tivoli Network Manager", "product": { "name": "IBM Tivoli Network Manager", "product_id": "T046989", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:-" } } }, { "category": "product_name", "name": "IBM WebSphere Application Server", "product": { "name": "IBM WebSphere Application Server", "product_id": "T000377", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:-" } } }, { "branches": [ { "category": "product_version", "name": "8.5", "product": { "name": "IBM WebSphere Service Registry and Repository 8.5", "product_id": "306235", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_service_registry_and_repository:8.5" } } } ], "category": "product_name", "name": "WebSphere Service Registry and Repository" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "IGEL OS", "product": { "name": "IGEL OS", "product_id": "T017865", "product_identification_helper": { "cpe": "cpe:/o:igel:os:-" } } } ], "category": "vendor", "name": "IGEL" }, { "branches": [ { "category": "product_name", "name": "Open Source OpenJDK", "product": { "name": "Open Source OpenJDK", "product_id": "580789", "product_identification_helper": { "cpe": "cpe:/a:oracle:openjdk:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "for JDK 17.0.15", "product": { "name": "Oracle GraalVM for JDK 17.0.15", "product_id": "T045416", "product_identification_helper": { "cpe": "cpe:/a:oracle:graalvm:for_jdk_17.0.15" } } }, { "category": "product_version", "name": "for JDK 21.0.7", "product": { "name": "Oracle GraalVM for JDK 21.0.7", "product_id": "T045417", "product_identification_helper": { "cpe": "cpe:/a:oracle:graalvm:for_jdk_21.0.7" } } }, { "category": "product_version", "name": "for JDK 24.0.1", "product": { "name": "Oracle GraalVM for JDK 24.0.1", "product_id": "T045418", "product_identification_helper": { "cpe": "cpe:/a:oracle:graalvm:for_jdk_24.0.1" } } }, { "category": "product_version", "name": "Enterprise Edition 21.3.14", "product": { "name": "Oracle GraalVM Enterprise Edition 21.3.14", "product_id": "T045419", "product_identification_helper": { "cpe": "cpe:/a:oracle:graalvm:enterprise_edition_21.3.14" } } } ], "category": "product_name", "name": "GraalVM" }, { "branches": [ { "category": "product_version", "name": "11.0.27", "product": { "name": "Oracle Java SE 11.0.27", "product_id": "T045386", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:11.0.27" } } }, { "category": "product_version", "name": "17.0.15", "product": { "name": "Oracle Java SE 17.0.15", "product_id": "T045387", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:17.0.15" } } }, { "category": "product_version", "name": "21.0.7", "product": { "name": "Oracle Java SE 21.0.7", "product_id": "T045388", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:21.0.7" } } }, { "category": "product_version", "name": "24.0.1", "product": { "name": "Oracle Java SE 24.0.1", "product_id": "T045389", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:24.0.1" } } }, { "category": "product_version", "name": "8u451-perf", "product": { "name": "Oracle Java SE 8u451-perf", "product_id": "T045415", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:8u451-perf" } } } ], "category": "product_name", "name": "Java SE" }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-23166", "product_status": { "known_affected": [ "T046590", "T011169", "T012259", "T004914", "T047329", "T047722", "398363", "T025611", "T045387", "T047720", "T045386", "T047721", "T045389", "T045422", "T045388", "T045421", "T033489", "T017562", "T036271", "T046988", "T045415", "T036273", "2951", "T002207", "T045417", "T045416", "444803", "T045419", "T046945", "T046989", "T045418", "T027843", "T047276", "T026238", "T047275", "T046466", "T040640", "306235", "67646", "700367", "T029071", "T036688", "T045525", "T046655", "T041162", "T046975", "T020304", "T000377", "T047347", "T038839", "T036617", "T038750", "T032495", "T045831", "T043411", "T046724", "T046727", "T017865", "T046728", "T000126", "T046725", "580789", "T046726", "T047331", "T045792", "T047330", "T045794", "T047534", "T045793", "T045795" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-23166" }, { "cve": "CVE-2025-24855", "product_status": { "known_affected": [ "T046590", "T011169", "T012259", "T004914", "T047329", "T047722", "398363", "T025611", "T045387", "T047720", "T045386", "T047721", "T045389", "T045422", "T045388", "T045421", "T033489", "T017562", "T036271", "T046988", "T045415", "T036273", "2951", "T002207", "T045417", "T045416", "444803", "T045419", "T046945", "T046989", "T045418", "T027843", "T047276", "T026238", "T047275", "T046466", "T040640", "306235", "67646", "700367", "T029071", "T036688", "T045525", "T046655", "T041162", "T046975", "T020304", "T000377", "T047347", "T038839", "T036617", "T038750", "T032495", "T045831", "T043411", "T046724", "T046727", "T017865", "T046728", "T000126", "T046725", "580789", "T046726", "T047331", "T045792", "T047330", "T045794", "T047534", "T045793", "T045795" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-24855" }, { "cve": "CVE-2025-27113", "product_status": { "known_affected": [ "T046590", "T011169", "T012259", "T004914", "T047329", "T047722", "398363", "T025611", "T045387", "T047720", "T045386", "T047721", "T045389", "T045422", "T045388", "T045421", "T033489", "T017562", "T036271", "T046988", "T045415", "T036273", "2951", "T002207", "T045417", "T045416", "444803", "T045419", "T046945", "T046989", "T045418", "T027843", "T047276", "T026238", "T047275", "T046466", "T040640", "306235", "67646", "700367", "T029071", "T036688", "T045525", "T046655", "T041162", "T046975", "T020304", "T000377", "T047347", "T038839", "T036617", "T038750", "T032495", "T045831", "T043411", "T046724", "T046727", "T017865", "T046728", "T000126", "T046725", "580789", "T046726", "T047331", "T045792", "T047330", "T045794", "T047534", "T045793", "T045795" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-27113" }, { "cve": "CVE-2025-30749", "product_status": { "known_affected": [ "T046590", "T011169", "T012259", "T004914", "T047329", "T047722", "398363", "T025611", "T045387", "T047720", "T045386", "T047721", "T045389", "T045422", "T045388", "T045421", "T033489", "T017562", "T036271", "T046988", "T045415", "T036273", "2951", "T002207", "T045417", "T045416", "444803", "T045419", "T046945", "T046989", "T045418", "T027843", "T047276", "T026238", "T047275", "T046466", "T040640", "306235", "67646", "700367", "T029071", "T036688", "T045525", "T046655", "T041162", "T046975", "T020304", "T000377", "T047347", "T038839", "T036617", "T038750", "T032495", "T045831", "T043411", "T046724", "T046727", "T017865", "T046728", "T000126", "T046725", "580789", "T046726", "T047331", "T045792", "T047330", "T045794", "T047534", "T045793", "T045795" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-30749" }, { "cve": "CVE-2025-30752", "product_status": { "known_affected": [ "T046590", "T011169", "T012259", "T004914", "T047329", "T047722", "398363", "T025611", "T045387", "T047720", "T045386", "T047721", "T045389", "T045422", "T045388", "T045421", "T033489", "T017562", "T036271", "T046988", "T045415", "T036273", "2951", "T002207", "T045417", "T045416", "444803", "T045419", "T046945", "T046989", "T045418", "T027843", "T047276", "T026238", "T047275", "T046466", "T040640", "306235", "67646", "700367", "T029071", "T036688", "T045525", "T046655", "T041162", "T046975", "T020304", "T000377", "T047347", "T038839", "T036617", "T038750", "T032495", "T045831", "T043411", "T046724", "T046727", "T017865", "T046728", "T000126", "T046725", "580789", "T046726", "T047331", "T045792", "T047330", "T045794", "T047534", "T045793", "T045795" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-30752" }, { "cve": "CVE-2025-30754", "product_status": { "known_affected": [ "T046590", "T011169", "T012259", "T004914", "T047329", "T047722", "398363", "T025611", "T045387", "T047720", "T045386", "T047721", "T045389", "T045422", "T045388", "T045421", "T033489", "T017562", "T036271", "T046988", "T045415", "T036273", "2951", "T002207", "T045417", "T045416", "444803", "T045419", "T046945", "T046989", "T045418", "T027843", "T047276", "T026238", "T047275", "T046466", "T040640", "306235", "67646", "700367", "T029071", "T036688", "T045525", "T046655", "T041162", "T046975", "T020304", "T000377", "T047347", "T038839", "T036617", "T038750", "T032495", "T045831", "T043411", "T046724", "T046727", "T017865", "T046728", "T000126", "T046725", "580789", "T046726", "T047331", "T045792", "T047330", "T045794", "T047534", "T045793", "T045795" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-30754" }, { "cve": "CVE-2025-30761", "product_status": { "known_affected": [ "T046590", "T011169", "T012259", "T004914", "T047329", "T047722", "398363", "T025611", "T045387", "T047720", "T045386", "T047721", "T045389", "T045422", "T045388", "T045421", "T033489", "T017562", "T036271", "T046988", "T045415", "T036273", "2951", "T002207", "T045417", "T045416", "444803", "T045419", "T046945", "T046989", "T045418", "T027843", "T047276", "T026238", "T047275", "T046466", "T040640", "306235", "67646", "700367", "T029071", "T036688", "T045525", "T046655", "T041162", "T046975", "T020304", "T000377", "T047347", "T038839", "T036617", "T038750", "T032495", "T045831", "T043411", "T046724", "T046727", "T017865", "T046728", "T000126", "T046725", "580789", "T046726", "T047331", "T045792", "T047330", "T045794", "T047534", "T045793", "T045795" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-30761" }, { "cve": "CVE-2025-50059", "product_status": { "known_affected": [ "T046590", "T011169", "T012259", "T004914", "T047329", "T047722", "398363", "T025611", "T045387", "T047720", "T045386", "T047721", "T045389", "T045422", "T045388", "T045421", "T033489", "T017562", "T036271", "T046988", "T045415", "T036273", "2951", "T002207", "T045417", "T045416", "444803", "T045419", "T046945", "T046989", "T045418", "T027843", "T047276", "T026238", "T047275", "T046466", "T040640", "306235", "67646", "700367", "T029071", "T036688", "T045525", "T046655", "T041162", "T046975", "T020304", "T000377", "T047347", "T038839", "T036617", "T038750", "T032495", "T045831", "T043411", "T046724", "T046727", "T017865", "T046728", "T000126", "T046725", "580789", "T046726", "T047331", "T045792", "T047330", "T045794", "T047534", "T045793", "T045795" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-50059" }, { "cve": "CVE-2025-50063", "product_status": { "known_affected": [ "T046590", "T011169", "T012259", "T004914", "T047329", "T047722", "398363", "T025611", "T045387", "T047720", "T045386", "T047721", "T045389", "T045422", "T045388", "T045421", "T033489", "T017562", "T036271", "T046988", "T045415", "T036273", "2951", "T002207", "T045417", "T045416", "444803", "T045419", "T046945", "T046989", "T045418", "T027843", "T047276", "T026238", "T047275", "T046466", "T040640", "306235", "67646", "700367", "T029071", "T036688", "T045525", "T046655", "T041162", "T046975", "T020304", "T000377", "T047347", "T038839", "T036617", "T038750", "T032495", "T045831", "T043411", "T046724", "T046727", "T017865", "T046728", "T000126", "T046725", "580789", "T046726", "T047331", "T045792", "T047330", "T045794", "T047534", "T045793", "T045795" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-50063" }, { "cve": "CVE-2025-50065", "product_status": { "known_affected": [ "T046590", "T011169", "T012259", "T004914", "T047329", "T047722", "398363", "T025611", "T045387", "T047720", "T045386", "T047721", "T045389", "T045422", "T045388", "T045421", "T033489", "T017562", "T036271", "T046988", "T045415", "T036273", "2951", "T002207", "T045417", "T045416", "444803", "T045419", "T046945", "T046989", "T045418", "T027843", "T047276", "T026238", "T047275", "T046466", "T040640", "306235", "67646", "700367", "T029071", "T036688", "T045525", "T046655", "T041162", "T046975", "T020304", "T000377", "T047347", "T038839", "T036617", "T038750", "T032495", "T045831", "T043411", "T046724", "T046727", "T017865", "T046728", "T000126", "T046725", "580789", "T046726", "T047331", "T045792", "T047330", "T045794", "T047534", "T045793", "T045795" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-50065" }, { "cve": "CVE-2025-50106", "product_status": { "known_affected": [ "T046590", "T011169", "T012259", "T004914", "T047329", "T047722", "398363", "T025611", "T045387", "T047720", "T045386", "T047721", "T045389", "T045422", "T045388", "T045421", "T033489", "T017562", "T036271", "T046988", "T045415", "T036273", "2951", "T002207", "T045417", "T045416", "444803", "T045419", "T046945", "T046989", "T045418", "T027843", "T047276", "T026238", "T047275", "T046466", "T040640", "306235", "67646", "700367", "T029071", "T036688", "T045525", "T046655", "T041162", "T046975", "T020304", "T000377", "T047347", "T038839", "T036617", "T038750", "T032495", "T045831", "T043411", "T046724", "T046727", "T017865", "T046728", "T000126", "T046725", "580789", "T046726", "T047331", "T045792", "T047330", "T045794", "T047534", "T045793", "T045795" ] }, "release_date": "2025-07-15T22:00:00.000+00:00", "title": "CVE-2025-50106" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…