Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-49860 (GCVE-0-2024-49860)
Vulnerability from cvelistv5 – Published: 2024-10-21 12:27 – Updated: 2026-05-11 20:40
VLAI?
EPSS
Title
ACPI: sysfs: validate return type of _STR method
Summary
In the Linux kernel, the following vulnerability has been resolved:
ACPI: sysfs: validate return type of _STR method
Only buffer objects are valid return values of _STR.
If something else is returned description_show() will access invalid
memory.
Severity ?
No CVSS data available.
Assigner
References
9 references
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Linux | Linux |
Affected:
d1efe3c324ead77d3f6cd85093b50f6bd2e17aba , < 92fd5209fc014405f63a7db79802ca4b01dc0c05
(git)
Affected: d1efe3c324ead77d3f6cd85093b50f6bd2e17aba , < 2364b6af90c6b6d8a4783e0d3481ca80af699554 (git) Affected: d1efe3c324ead77d3f6cd85093b50f6bd2e17aba , < 4b081991c4363e072e1748efed0bbec8a77daba5 (git) Affected: d1efe3c324ead77d3f6cd85093b50f6bd2e17aba , < 0cdfb9178a3bba843c95c2117c82c15f1a64b9ce (git) Affected: d1efe3c324ead77d3f6cd85093b50f6bd2e17aba , < 5c8d007c14aefc3f2ddf71e4c40713733dc827be (git) Affected: d1efe3c324ead77d3f6cd85093b50f6bd2e17aba , < f0921ecd4ddc14646bb5511f49db4d7d3b0829f0 (git) Affected: d1efe3c324ead77d3f6cd85093b50f6bd2e17aba , < f51e5a88f2e7224858b261546cf6b3037dfb1323 (git) Affected: d1efe3c324ead77d3f6cd85093b50f6bd2e17aba , < f51f711d36e61fbb87c67b524fd200e05172668d (git) Affected: d1efe3c324ead77d3f6cd85093b50f6bd2e17aba , < 4bb1e7d027413835b086aed35bc3f0713bc0f72b (git) |
|
| Linux | Linux |
Affected:
3.7
Unaffected: 0 , < 3.7 (semver) Unaffected: 4.19.323 , ≤ 4.19.* (semver) Unaffected: 5.4.285 , ≤ 5.4.* (semver) Unaffected: 5.10.227 , ≤ 5.10.* (semver) Unaffected: 5.15.168 , ≤ 5.15.* (semver) Unaffected: 6.1.113 , ≤ 6.1.* (semver) Unaffected: 6.6.54 , ≤ 6.6.* (semver) Unaffected: 6.10.13 , ≤ 6.10.* (semver) Unaffected: 6.11.2 , ≤ 6.11.* (semver) Unaffected: 6.12 , ≤ * (original_commit_for_fix) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-49860",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-21T12:55:46.676497Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-21T13:04:10.485Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T22:22:30.053Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/acpi/device_sysfs.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "92fd5209fc014405f63a7db79802ca4b01dc0c05",
"status": "affected",
"version": "d1efe3c324ead77d3f6cd85093b50f6bd2e17aba",
"versionType": "git"
},
{
"lessThan": "2364b6af90c6b6d8a4783e0d3481ca80af699554",
"status": "affected",
"version": "d1efe3c324ead77d3f6cd85093b50f6bd2e17aba",
"versionType": "git"
},
{
"lessThan": "4b081991c4363e072e1748efed0bbec8a77daba5",
"status": "affected",
"version": "d1efe3c324ead77d3f6cd85093b50f6bd2e17aba",
"versionType": "git"
},
{
"lessThan": "0cdfb9178a3bba843c95c2117c82c15f1a64b9ce",
"status": "affected",
"version": "d1efe3c324ead77d3f6cd85093b50f6bd2e17aba",
"versionType": "git"
},
{
"lessThan": "5c8d007c14aefc3f2ddf71e4c40713733dc827be",
"status": "affected",
"version": "d1efe3c324ead77d3f6cd85093b50f6bd2e17aba",
"versionType": "git"
},
{
"lessThan": "f0921ecd4ddc14646bb5511f49db4d7d3b0829f0",
"status": "affected",
"version": "d1efe3c324ead77d3f6cd85093b50f6bd2e17aba",
"versionType": "git"
},
{
"lessThan": "f51e5a88f2e7224858b261546cf6b3037dfb1323",
"status": "affected",
"version": "d1efe3c324ead77d3f6cd85093b50f6bd2e17aba",
"versionType": "git"
},
{
"lessThan": "f51f711d36e61fbb87c67b524fd200e05172668d",
"status": "affected",
"version": "d1efe3c324ead77d3f6cd85093b50f6bd2e17aba",
"versionType": "git"
},
{
"lessThan": "4bb1e7d027413835b086aed35bc3f0713bc0f72b",
"status": "affected",
"version": "d1efe3c324ead77d3f6cd85093b50f6bd2e17aba",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/acpi/device_sysfs.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "3.7"
},
{
"lessThan": "3.7",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"version": "4.19.323",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.285",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.227",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.168",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.113",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.54",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.10.*",
"status": "unaffected",
"version": "6.10.13",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.11.*",
"status": "unaffected",
"version": "6.11.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.12",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.323",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.285",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.227",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.168",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.113",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.54",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.10.13",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.11.2",
"versionStartIncluding": "3.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12",
"versionStartIncluding": "3.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: sysfs: validate return type of _STR method\n\nOnly buffer objects are valid return values of _STR.\n\nIf something else is returned description_show() will access invalid\nmemory."
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T20:40:37.641Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/92fd5209fc014405f63a7db79802ca4b01dc0c05"
},
{
"url": "https://git.kernel.org/stable/c/2364b6af90c6b6d8a4783e0d3481ca80af699554"
},
{
"url": "https://git.kernel.org/stable/c/4b081991c4363e072e1748efed0bbec8a77daba5"
},
{
"url": "https://git.kernel.org/stable/c/0cdfb9178a3bba843c95c2117c82c15f1a64b9ce"
},
{
"url": "https://git.kernel.org/stable/c/5c8d007c14aefc3f2ddf71e4c40713733dc827be"
},
{
"url": "https://git.kernel.org/stable/c/f0921ecd4ddc14646bb5511f49db4d7d3b0829f0"
},
{
"url": "https://git.kernel.org/stable/c/f51e5a88f2e7224858b261546cf6b3037dfb1323"
},
{
"url": "https://git.kernel.org/stable/c/f51f711d36e61fbb87c67b524fd200e05172668d"
},
{
"url": "https://git.kernel.org/stable/c/4bb1e7d027413835b086aed35bc3f0713bc0f72b"
}
],
"title": "ACPI: sysfs: validate return type of _STR method",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2024-49860",
"datePublished": "2024-10-21T12:27:18.640Z",
"dateReserved": "2024-10-21T12:17:06.017Z",
"dateUpdated": "2026-05-11T20:40:37.641Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-49860",
"date": "2026-05-21",
"epss": "0.00014",
"percentile": "0.02474"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-49860\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-10-21T13:15:06.723\",\"lastModified\":\"2025-11-03T23:16:26.417\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nACPI: sysfs: validate return type of _STR method\\n\\nOnly buffer objects are valid return values of _STR.\\n\\nIf something else is returned description_show() will access invalid\\nmemory.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ACPI: sysfs: validar el tipo de retorno del m\u00e9todo _STR. Solo los objetos de b\u00fafer son valores de retorno v\u00e1lidos de _STR. Si se devuelve algo diferente, description_show() acceder\u00e1 a memoria no v\u00e1lida.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-843\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.7\",\"versionEndExcluding\":\"5.10.227\",\"matchCriteriaId\":\"3B73A13A-D7BE-4035-BEF2-2821D9D5CB6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.168\",\"matchCriteriaId\":\"4D51C05D-455B-4D8D-89E7-A58E140B864C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.113\",\"matchCriteriaId\":\"D01BD22E-ACD1-4618-9D01-6116570BE1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.54\",\"matchCriteriaId\":\"D448821D-C085-4CAF-88FA-2DDE7BE21976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.13\",\"matchCriteriaId\":\"CE94BB8D-B0AB-4563-9ED7-A12122B56EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.11\",\"versionEndExcluding\":\"6.11.2\",\"matchCriteriaId\":\"AB755D26-97F4-43B6-8604-CD076811E181\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0cdfb9178a3bba843c95c2117c82c15f1a64b9ce\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2364b6af90c6b6d8a4783e0d3481ca80af699554\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4b081991c4363e072e1748efed0bbec8a77daba5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4bb1e7d027413835b086aed35bc3f0713bc0f72b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5c8d007c14aefc3f2ddf71e4c40713733dc827be\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/92fd5209fc014405f63a7db79802ca4b01dc0c05\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f0921ecd4ddc14646bb5511f49db4d7d3b0829f0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f51e5a88f2e7224858b261546cf6b3037dfb1323\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f51f711d36e61fbb87c67b524fd200e05172668d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T22:22:30.053Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-49860\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-21T12:55:46.676497Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-21T12:55:49.896Z\"}}], \"cna\": {\"title\": \"ACPI: sysfs: validate return type of _STR method\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"d1efe3c324ead77d3f6cd85093b50f6bd2e17aba\", \"lessThan\": \"92fd5209fc014405f63a7db79802ca4b01dc0c05\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d1efe3c324ead77d3f6cd85093b50f6bd2e17aba\", \"lessThan\": \"2364b6af90c6b6d8a4783e0d3481ca80af699554\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d1efe3c324ead77d3f6cd85093b50f6bd2e17aba\", \"lessThan\": \"4b081991c4363e072e1748efed0bbec8a77daba5\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d1efe3c324ead77d3f6cd85093b50f6bd2e17aba\", \"lessThan\": \"0cdfb9178a3bba843c95c2117c82c15f1a64b9ce\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d1efe3c324ead77d3f6cd85093b50f6bd2e17aba\", \"lessThan\": \"5c8d007c14aefc3f2ddf71e4c40713733dc827be\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d1efe3c324ead77d3f6cd85093b50f6bd2e17aba\", \"lessThan\": \"f0921ecd4ddc14646bb5511f49db4d7d3b0829f0\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d1efe3c324ead77d3f6cd85093b50f6bd2e17aba\", \"lessThan\": \"f51e5a88f2e7224858b261546cf6b3037dfb1323\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d1efe3c324ead77d3f6cd85093b50f6bd2e17aba\", \"lessThan\": \"f51f711d36e61fbb87c67b524fd200e05172668d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d1efe3c324ead77d3f6cd85093b50f6bd2e17aba\", \"lessThan\": \"4bb1e7d027413835b086aed35bc3f0713bc0f72b\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/acpi/device_sysfs.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.7\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.7\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.323\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.285\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.227\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.168\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.113\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.54\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.13\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.11.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/acpi/device_sysfs.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/92fd5209fc014405f63a7db79802ca4b01dc0c05\"}, {\"url\": \"https://git.kernel.org/stable/c/2364b6af90c6b6d8a4783e0d3481ca80af699554\"}, {\"url\": \"https://git.kernel.org/stable/c/4b081991c4363e072e1748efed0bbec8a77daba5\"}, {\"url\": \"https://git.kernel.org/stable/c/0cdfb9178a3bba843c95c2117c82c15f1a64b9ce\"}, {\"url\": \"https://git.kernel.org/stable/c/5c8d007c14aefc3f2ddf71e4c40713733dc827be\"}, {\"url\": \"https://git.kernel.org/stable/c/f0921ecd4ddc14646bb5511f49db4d7d3b0829f0\"}, {\"url\": \"https://git.kernel.org/stable/c/f51e5a88f2e7224858b261546cf6b3037dfb1323\"}, {\"url\": \"https://git.kernel.org/stable/c/f51f711d36e61fbb87c67b524fd200e05172668d\"}, {\"url\": \"https://git.kernel.org/stable/c/4bb1e7d027413835b086aed35bc3f0713bc0f72b\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nACPI: sysfs: validate return type of _STR method\\n\\nOnly buffer objects are valid return values of _STR.\\n\\nIf something else is returned description_show() will access invalid\\nmemory.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.323\", \"versionStartIncluding\": \"3.7\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.285\", \"versionStartIncluding\": \"3.7\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.227\", \"versionStartIncluding\": \"3.7\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.168\", \"versionStartIncluding\": \"3.7\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.113\", \"versionStartIncluding\": \"3.7\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.54\", \"versionStartIncluding\": \"3.7\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10.13\", \"versionStartIncluding\": \"3.7\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11.2\", \"versionStartIncluding\": \"3.7\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.12\", \"versionStartIncluding\": \"3.7\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:39:44.814Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-49860\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T22:22:30.053Z\", \"dateReserved\": \"2024-10-21T12:17:06.017Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-10-21T12:27:18.640Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
SUSE-SU-2025:20768-1
Vulnerability from csaf_suse - Published: 2025-09-23 07:53 - Updated: 2025-09-23 07:53Summary
Security update for kernel-livepatch-MICRO-6-0_Update_2
Severity
Important
Notes
Title of the patch: Security update for kernel-livepatch-MICRO-6-0_Update_2
Description of the patch: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues:
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231862)
- CVE-2025-38177: kernel: sch_hfsc: make hfsc_qlen_notify() idempotent (bsc#1246356)
- CVE-2025-38109: net/mlx5: fix ECVF vports unload on shutdown flow (bsc#1245685)
- CVE-2025-38181: calipso: fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246001)
- CVE-2025-21756: vsock: Keep the binding until socket destruction (bsc#1245795)
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247499)
- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248298)
Patchnames: SUSE-SLE-Micro-6.1-kernel-130
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.5 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
2 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
41 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-livepatch-MICRO-6-0_Update_2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues:\n\n- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231862)\n- CVE-2025-38177: kernel: sch_hfsc: make hfsc_qlen_notify() idempotent (bsc#1246356)\n- CVE-2025-38109: net/mlx5: fix ECVF vports unload on shutdown flow (bsc#1245685)\n- CVE-2025-38181: calipso: fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246001)\n- CVE-2025-21756: vsock: Keep the binding until socket destruction (bsc#1245795)\n- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247499)\n- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248298)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-kernel-130",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20768-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20768-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520768-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20768-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html"
},
{
"category": "self",
"summary": "SUSE Bug 1231862",
"url": "https://bugzilla.suse.com/1231862"
},
{
"category": "self",
"summary": "SUSE Bug 1245685",
"url": "https://bugzilla.suse.com/1245685"
},
{
"category": "self",
"summary": "SUSE Bug 1245795",
"url": "https://bugzilla.suse.com/1245795"
},
{
"category": "self",
"summary": "SUSE Bug 1246001",
"url": "https://bugzilla.suse.com/1246001"
},
{
"category": "self",
"summary": "SUSE Bug 1246356",
"url": "https://bugzilla.suse.com/1246356"
},
{
"category": "self",
"summary": "SUSE Bug 1247499",
"url": "https://bugzilla.suse.com/1247499"
},
{
"category": "self",
"summary": "SUSE Bug 1248298",
"url": "https://bugzilla.suse.com/1248298"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-49860 page",
"url": "https://www.suse.com/security/cve/CVE-2024-49860/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21756 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38181 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38498 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38498/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38555 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38555/"
}
],
"title": "Security update for kernel-livepatch-MICRO-6-0_Update_2",
"tracking": {
"current_release_date": "2025-09-23T07:53:43Z",
"generator": {
"date": "2025-09-23T07:53:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20768-1",
"initial_release_date": "2025-09-23T07:53:43Z",
"revision_history": [
{
"date": "2025-09-23T07:53:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"product_id": "kernel-livepatch-6_4_0-19-default-12-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-19-default-12-1.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-19-default-12-1.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-19-default-12-1.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-19-default-12-1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-19-default-12-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-49860",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-49860"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: sysfs: validate return type of _STR method\n\nOnly buffer objects are valid return values of _STR.\n\nIf something else is returned description_show() will access invalid\nmemory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-49860",
"url": "https://www.suse.com/security/cve/CVE-2024-49860"
},
{
"category": "external",
"summary": "SUSE Bug 1231861 for CVE-2024-49860",
"url": "https://bugzilla.suse.com/1231861"
},
{
"category": "external",
"summary": "SUSE Bug 1231862 for CVE-2024-49860",
"url": "https://bugzilla.suse.com/1231862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:53:43Z",
"details": "important"
}
],
"title": "CVE-2024-49860"
},
{
"cve": "CVE-2025-21756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21756"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Keep the binding until socket destruction\n\nPreserve sockets bindings; this includes both resulting from an explicit\nbind() and those implicitly bound through autobind during connect().\n\nPrevents socket unbinding during a transport reassignment, which fixes a\nuse-after-free:\n\n 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2)\n 2. transport-\u003erelease() calls vsock_remove_bound() without checking if\n sk was bound and moved to bound list (refcnt=1)\n 3. vsock_bind() assumes sk is in unbound list and before\n __vsock_insert_bound(vsock_bound_sockets()) calls\n __vsock_remove_bound() which does:\n list_del_init(\u0026vsk-\u003ebound_table); // nop\n sock_put(\u0026vsk-\u003esk); // refcnt=0\n\nBUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730\nRead of size 4 at addr ffff88816b46a74c by task a.out/2057\n dump_stack_lvl+0x68/0x90\n print_report+0x174/0x4f6\n kasan_report+0xb9/0x190\n __vsock_bind+0x62e/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nAllocated by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n __kasan_slab_alloc+0x85/0x90\n kmem_cache_alloc_noprof+0x131/0x450\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x2c/0x870\n __vsock_create.constprop.0+0x2e/0xb60\n vsock_create+0xe4/0x420\n __sock_create+0x241/0x650\n __sys_socket+0xf2/0x1a0\n __x64_sys_socket+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kmem_cache_free+0x1a1/0x590\n __sk_destruct+0x388/0x5a0\n __vsock_bind+0x5e1/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150\nRIP: 0010:refcount_warn_saturate+0xce/0x150\n __vsock_bind+0x66d/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150\nRIP: 0010:refcount_warn_saturate+0xee/0x150\n vsock_remove_bound+0x187/0x1e0\n __vsock_release+0x383/0x4a0\n vsock_release+0x90/0x120\n __sock_release+0xa3/0x250\n sock_close+0x14/0x20\n __fput+0x359/0xa80\n task_work_run+0x107/0x1d0\n do_exit+0x847/0x2560\n do_group_exit+0xb8/0x250\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0xfec/0x14f0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21756",
"url": "https://www.suse.com/security/cve/CVE-2025-21756"
},
{
"category": "external",
"summary": "SUSE Bug 1238876 for CVE-2025-21756",
"url": "https://bugzilla.suse.com/1238876"
},
{
"category": "external",
"summary": "SUSE Bug 1245795 for CVE-2025-21756",
"url": "https://bugzilla.suse.com/1245795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:53:43Z",
"details": "important"
}
],
"title": "CVE-2025-21756"
},
{
"cve": "CVE-2025-38109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix ECVF vports unload on shutdown flow\n\nFix shutdown flow UAF when a virtual function is created on the embedded\nchip (ECVF) of a BlueField device. In such case the vport acl ingress\ntable is not properly destroyed.\n\nECVF functionality is independent of ecpf_vport_exists capability and\nthus functions mlx5_eswitch_(enable|disable)_pf_vf_vports() should not\ntest it when enabling/disabling ECVF vports.\n\nkernel log:\n[] refcount_t: underflow; use-after-free.\n[] WARNING: CPU: 3 PID: 1 at lib/refcount.c:28\n refcount_warn_saturate+0x124/0x220\n----------------\n[] Call trace:\n[] refcount_warn_saturate+0x124/0x220\n[] tree_put_node+0x164/0x1e0 [mlx5_core]\n[] mlx5_destroy_flow_table+0x98/0x2c0 [mlx5_core]\n[] esw_acl_ingress_table_destroy+0x28/0x40 [mlx5_core]\n[] esw_acl_ingress_lgcy_cleanup+0x80/0xf4 [mlx5_core]\n[] esw_legacy_vport_acl_cleanup+0x44/0x60 [mlx5_core]\n[] esw_vport_cleanup+0x64/0x90 [mlx5_core]\n[] mlx5_esw_vport_disable+0xc0/0x1d0 [mlx5_core]\n[] mlx5_eswitch_unload_ec_vf_vports+0xcc/0x150 [mlx5_core]\n[] mlx5_eswitch_disable_sriov+0x198/0x2a0 [mlx5_core]\n[] mlx5_device_disable_sriov+0xb8/0x1e0 [mlx5_core]\n[] mlx5_sriov_detach+0x40/0x50 [mlx5_core]\n[] mlx5_unload+0x40/0xc4 [mlx5_core]\n[] mlx5_unload_one_devl_locked+0x6c/0xe4 [mlx5_core]\n[] mlx5_unload_one+0x3c/0x60 [mlx5_core]\n[] shutdown+0x7c/0xa4 [mlx5_core]\n[] pci_device_shutdown+0x3c/0xa0\n[] device_shutdown+0x170/0x340\n[] __do_sys_reboot+0x1f4/0x2a0\n[] __arm64_sys_reboot+0x2c/0x40\n[] invoke_syscall+0x78/0x100\n[] el0_svc_common.constprop.0+0x54/0x184\n[] do_el0_svc+0x30/0xac\n[] el0_svc+0x48/0x160\n[] el0t_64_sync_handler+0xa4/0x12c\n[] el0t_64_sync+0x1a4/0x1a8\n[] --[ end trace 9c4601d68c70030e ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38109",
"url": "https://www.suse.com/security/cve/CVE-2025-38109"
},
{
"category": "external",
"summary": "SUSE Bug 1245684 for CVE-2025-38109",
"url": "https://bugzilla.suse.com/1245684"
},
{
"category": "external",
"summary": "SUSE Bug 1245685 for CVE-2025-38109",
"url": "https://bugzilla.suse.com/1245685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:53:43Z",
"details": "important"
}
],
"title": "CVE-2025-38109"
},
{
"cve": "CVE-2025-38177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: make hfsc_qlen_notify() idempotent\n\nhfsc_qlen_notify() is not idempotent either and not friendly\nto its callers, like fq_codel_dequeue(). Let\u0027s make it idempotent\nto ease qdisc_tree_reduce_backlog() callers\u0027 life:\n\n1. update_vf() decreases cl-\u003ecl_nactive, so we can check whether it is\nnon-zero before calling it.\n\n2. eltree_remove() always removes RB node cl-\u003eel_node, but we can use\n RB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38177",
"url": "https://www.suse.com/security/cve/CVE-2025-38177"
},
{
"category": "external",
"summary": "SUSE Bug 1237312 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1237312"
},
{
"category": "external",
"summary": "SUSE Bug 1245986 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1245986"
},
{
"category": "external",
"summary": "SUSE Bug 1246356 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1246356"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1247374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:53:43Z",
"details": "important"
}
],
"title": "CVE-2025-38177"
},
{
"cve": "CVE-2025-38181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38181"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: Fix null-ptr-deref in calipso_req_{set,del}attr().\n\nsyzkaller reported a null-ptr-deref in sock_omalloc() while allocating\na CALIPSO option. [0]\n\nThe NULL is of struct sock, which was fetched by sk_to_full_sk() in\ncalipso_req_setattr().\n\nSince commit a1a5344ddbe8 (\"tcp: avoid two atomic ops for syncookies\"),\nreqsk-\u003ersk_listener could be NULL when SYN Cookie is returned to its\nclient, as hinted by the leading SYN Cookie log.\n\nHere are 3 options to fix the bug:\n\n 1) Return 0 in calipso_req_setattr()\n 2) Return an error in calipso_req_setattr()\n 3) Alaways set rsk_listener\n\n1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie\nfor CALIPSO. 3) is also no go as there have been many efforts to reduce\natomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35\n(\"tcp/dccp: do not touch listener sk_refcnt under synflood\").\n\nAs of the blamed commit, SYN Cookie already did not need refcounting,\nand no one has stumbled on the bug for 9 years, so no CALIPSO user will\ncare about SYN Cookie.\n\nLet\u0027s return an error in calipso_req_setattr() and calipso_req_delattr()\nin the SYN Cookie case.\n\nThis can be reproduced by [1] on Fedora and now connect() of nc times out.\n\n[0]:\nTCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\nCPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nRIP: 0010:read_pnet include/net/net_namespace.h:406 [inline]\nRIP: 0010:sock_net include/net/sock.h:655 [inline]\nRIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806\nCode: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b\nRSP: 0018:ffff88811af89038 EFLAGS: 00010216\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400\nRDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030\nRBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e\nR10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000\nR13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050\nFS: 00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0\nPKRU: 80000000\nCall Trace:\n \u003cIRQ\u003e\n ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288\n calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204\n calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597\n netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249\n selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342\n selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551\n security_inet_conn_request+0x50/0xa0 security/security.c:4945\n tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825\n tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275\n tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328\n tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781\n tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667\n tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904\n ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436\n ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491\n dst_input include/net/dst.h:469 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]\n ip6_rcv_finish+0xb6/0x490 net/ipv6/ip6_input.c:69\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netf\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38181",
"url": "https://www.suse.com/security/cve/CVE-2025-38181"
},
{
"category": "external",
"summary": "SUSE Bug 1246000 for CVE-2025-38181",
"url": "https://bugzilla.suse.com/1246000"
},
{
"category": "external",
"summary": "SUSE Bug 1246001 for CVE-2025-38181",
"url": "https://bugzilla.suse.com/1246001"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:53:43Z",
"details": "important"
}
],
"title": "CVE-2025-38181"
},
{
"cve": "CVE-2025-38498",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38498"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndo_change_type(): refuse to operate on unmounted/not ours mounts\n\nEnsure that propagation settings can only be changed for mounts located\nin the caller\u0027s mount namespace. This change aligns permission checking\nwith the rest of mount(2).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38498",
"url": "https://www.suse.com/security/cve/CVE-2025-38498"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2025-38498",
"url": "https://bugzilla.suse.com/1247374"
},
{
"category": "external",
"summary": "SUSE Bug 1247499 for CVE-2025-38498",
"url": "https://bugzilla.suse.com/1247499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:53:43Z",
"details": "important"
}
],
"title": "CVE-2025-38498"
},
{
"cve": "CVE-2025-38555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38555"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget : fix use-after-free in composite_dev_cleanup()\n\n1. In func configfs_composite_bind() -\u003e composite_os_desc_req_prepare():\nif kmalloc fails, the pointer cdev-\u003eos_desc_req will be freed but not\nset to NULL. Then it will return a failure to the upper-level function.\n2. in func configfs_composite_bind() -\u003e composite_dev_cleanup():\nit will checks whether cdev-\u003eos_desc_req is NULL. If it is not NULL, it\nwill attempt to use it.This will lead to a use-after-free issue.\n\nBUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0\nRead of size 8 at addr 0000004827837a00 by task init/1\n\nCPU: 10 PID: 1 Comm: init Tainted: G O 5.10.97-oh #1\n kasan_report+0x188/0x1cc\n __asan_load8+0xb4/0xbc\n composite_dev_cleanup+0xf4/0x2c0\n configfs_composite_bind+0x210/0x7ac\n udc_bind_to_driver+0xb4/0x1ec\n usb_gadget_probe_driver+0xec/0x21c\n gadget_dev_desc_UDC_store+0x264/0x27c",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38555",
"url": "https://www.suse.com/security/cve/CVE-2025-38555"
},
{
"category": "external",
"summary": "SUSE Bug 1248297 for CVE-2025-38555",
"url": "https://bugzilla.suse.com/1248297"
},
{
"category": "external",
"summary": "SUSE Bug 1248298 for CVE-2025-38555",
"url": "https://bugzilla.suse.com/1248298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.s390x",
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-19-default-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:53:43Z",
"details": "important"
}
],
"title": "CVE-2025-38555"
}
]
}
SUSE-SU-2025:20784-1
Vulnerability from csaf_suse - Published: 2025-09-23 07:47 - Updated: 2025-09-23 07:47Summary
Security update for kernel-livepatch-MICRO-6-0-RT_Update_2
Severity
Moderate
Notes
Title of the patch: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2
Description of the patch: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues:
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231862)
- CVE-2025-38177: kernel: sch_hfsc: make hfsc_qlen_notify() idempotent (bsc#1246356)
- CVE-2025-38109: net/mlx5: fix ECVF vports unload on shutdown flow (bsc#1245685)
- CVE-2025-38181: calipso: fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246001)
- CVE-2025-21756: vsock: Keep the binding until socket destruction (bsc#1245795)
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247499)
- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248298)
Patchnames: SUSE-SLE-Micro-6.1-kernel-121
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.5 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
41 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kernel-livepatch-MICRO-6-0-RT_Update_2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues:\n\n- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231862)\n- CVE-2025-38177: kernel: sch_hfsc: make hfsc_qlen_notify() idempotent (bsc#1246356)\n- CVE-2025-38109: net/mlx5: fix ECVF vports unload on shutdown flow (bsc#1245685)\n- CVE-2025-38181: calipso: fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246001)\n- CVE-2025-21756: vsock: Keep the binding until socket destruction (bsc#1245795)\n- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247499)\n- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248298)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-kernel-121",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20784-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20784-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520784-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20784-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html"
},
{
"category": "self",
"summary": "SUSE Bug 1231862",
"url": "https://bugzilla.suse.com/1231862"
},
{
"category": "self",
"summary": "SUSE Bug 1245685",
"url": "https://bugzilla.suse.com/1245685"
},
{
"category": "self",
"summary": "SUSE Bug 1245795",
"url": "https://bugzilla.suse.com/1245795"
},
{
"category": "self",
"summary": "SUSE Bug 1246001",
"url": "https://bugzilla.suse.com/1246001"
},
{
"category": "self",
"summary": "SUSE Bug 1246356",
"url": "https://bugzilla.suse.com/1246356"
},
{
"category": "self",
"summary": "SUSE Bug 1247499",
"url": "https://bugzilla.suse.com/1247499"
},
{
"category": "self",
"summary": "SUSE Bug 1248298",
"url": "https://bugzilla.suse.com/1248298"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-49860 page",
"url": "https://www.suse.com/security/cve/CVE-2024-49860/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21756 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38181 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38498 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38498/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38555 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38555/"
}
],
"title": "Security update for kernel-livepatch-MICRO-6-0-RT_Update_2",
"tracking": {
"current_release_date": "2025-09-23T07:47:12Z",
"generator": {
"date": "2025-09-23T07:47:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20784-1",
"initial_release_date": "2025-09-23T07:47:12Z",
"revision_history": [
{
"date": "2025-09-23T07:47:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-49860",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-49860"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: sysfs: validate return type of _STR method\n\nOnly buffer objects are valid return values of _STR.\n\nIf something else is returned description_show() will access invalid\nmemory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-49860",
"url": "https://www.suse.com/security/cve/CVE-2024-49860"
},
{
"category": "external",
"summary": "SUSE Bug 1231861 for CVE-2024-49860",
"url": "https://bugzilla.suse.com/1231861"
},
{
"category": "external",
"summary": "SUSE Bug 1231862 for CVE-2024-49860",
"url": "https://bugzilla.suse.com/1231862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:47:12Z",
"details": "important"
}
],
"title": "CVE-2024-49860"
},
{
"cve": "CVE-2025-21756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21756"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Keep the binding until socket destruction\n\nPreserve sockets bindings; this includes both resulting from an explicit\nbind() and those implicitly bound through autobind during connect().\n\nPrevents socket unbinding during a transport reassignment, which fixes a\nuse-after-free:\n\n 1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2)\n 2. transport-\u003erelease() calls vsock_remove_bound() without checking if\n sk was bound and moved to bound list (refcnt=1)\n 3. vsock_bind() assumes sk is in unbound list and before\n __vsock_insert_bound(vsock_bound_sockets()) calls\n __vsock_remove_bound() which does:\n list_del_init(\u0026vsk-\u003ebound_table); // nop\n sock_put(\u0026vsk-\u003esk); // refcnt=0\n\nBUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730\nRead of size 4 at addr ffff88816b46a74c by task a.out/2057\n dump_stack_lvl+0x68/0x90\n print_report+0x174/0x4f6\n kasan_report+0xb9/0x190\n __vsock_bind+0x62e/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nAllocated by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n __kasan_slab_alloc+0x85/0x90\n kmem_cache_alloc_noprof+0x131/0x450\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x2c/0x870\n __vsock_create.constprop.0+0x2e/0xb60\n vsock_create+0xe4/0x420\n __sock_create+0x241/0x650\n __sys_socket+0xf2/0x1a0\n __x64_sys_socket+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 2057:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kmem_cache_free+0x1a1/0x590\n __sk_destruct+0x388/0x5a0\n __vsock_bind+0x5e1/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150\nRIP: 0010:refcount_warn_saturate+0xce/0x150\n __vsock_bind+0x66d/0x730\n vsock_bind+0x97/0xe0\n __sys_bind+0x154/0x1f0\n __x64_sys_bind+0x6e/0xb0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150\nRIP: 0010:refcount_warn_saturate+0xee/0x150\n vsock_remove_bound+0x187/0x1e0\n __vsock_release+0x383/0x4a0\n vsock_release+0x90/0x120\n __sock_release+0xa3/0x250\n sock_close+0x14/0x20\n __fput+0x359/0xa80\n task_work_run+0x107/0x1d0\n do_exit+0x847/0x2560\n do_group_exit+0xb8/0x250\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0xfec/0x14f0\n do_syscall_64+0x93/0x1b0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21756",
"url": "https://www.suse.com/security/cve/CVE-2025-21756"
},
{
"category": "external",
"summary": "SUSE Bug 1238876 for CVE-2025-21756",
"url": "https://bugzilla.suse.com/1238876"
},
{
"category": "external",
"summary": "SUSE Bug 1245795 for CVE-2025-21756",
"url": "https://bugzilla.suse.com/1245795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:47:12Z",
"details": "important"
}
],
"title": "CVE-2025-21756"
},
{
"cve": "CVE-2025-38109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix ECVF vports unload on shutdown flow\n\nFix shutdown flow UAF when a virtual function is created on the embedded\nchip (ECVF) of a BlueField device. In such case the vport acl ingress\ntable is not properly destroyed.\n\nECVF functionality is independent of ecpf_vport_exists capability and\nthus functions mlx5_eswitch_(enable|disable)_pf_vf_vports() should not\ntest it when enabling/disabling ECVF vports.\n\nkernel log:\n[] refcount_t: underflow; use-after-free.\n[] WARNING: CPU: 3 PID: 1 at lib/refcount.c:28\n refcount_warn_saturate+0x124/0x220\n----------------\n[] Call trace:\n[] refcount_warn_saturate+0x124/0x220\n[] tree_put_node+0x164/0x1e0 [mlx5_core]\n[] mlx5_destroy_flow_table+0x98/0x2c0 [mlx5_core]\n[] esw_acl_ingress_table_destroy+0x28/0x40 [mlx5_core]\n[] esw_acl_ingress_lgcy_cleanup+0x80/0xf4 [mlx5_core]\n[] esw_legacy_vport_acl_cleanup+0x44/0x60 [mlx5_core]\n[] esw_vport_cleanup+0x64/0x90 [mlx5_core]\n[] mlx5_esw_vport_disable+0xc0/0x1d0 [mlx5_core]\n[] mlx5_eswitch_unload_ec_vf_vports+0xcc/0x150 [mlx5_core]\n[] mlx5_eswitch_disable_sriov+0x198/0x2a0 [mlx5_core]\n[] mlx5_device_disable_sriov+0xb8/0x1e0 [mlx5_core]\n[] mlx5_sriov_detach+0x40/0x50 [mlx5_core]\n[] mlx5_unload+0x40/0xc4 [mlx5_core]\n[] mlx5_unload_one_devl_locked+0x6c/0xe4 [mlx5_core]\n[] mlx5_unload_one+0x3c/0x60 [mlx5_core]\n[] shutdown+0x7c/0xa4 [mlx5_core]\n[] pci_device_shutdown+0x3c/0xa0\n[] device_shutdown+0x170/0x340\n[] __do_sys_reboot+0x1f4/0x2a0\n[] __arm64_sys_reboot+0x2c/0x40\n[] invoke_syscall+0x78/0x100\n[] el0_svc_common.constprop.0+0x54/0x184\n[] do_el0_svc+0x30/0xac\n[] el0_svc+0x48/0x160\n[] el0t_64_sync_handler+0xa4/0x12c\n[] el0t_64_sync+0x1a4/0x1a8\n[] --[ end trace 9c4601d68c70030e ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38109",
"url": "https://www.suse.com/security/cve/CVE-2025-38109"
},
{
"category": "external",
"summary": "SUSE Bug 1245684 for CVE-2025-38109",
"url": "https://bugzilla.suse.com/1245684"
},
{
"category": "external",
"summary": "SUSE Bug 1245685 for CVE-2025-38109",
"url": "https://bugzilla.suse.com/1245685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:47:12Z",
"details": "important"
}
],
"title": "CVE-2025-38109"
},
{
"cve": "CVE-2025-38177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: make hfsc_qlen_notify() idempotent\n\nhfsc_qlen_notify() is not idempotent either and not friendly\nto its callers, like fq_codel_dequeue(). Let\u0027s make it idempotent\nto ease qdisc_tree_reduce_backlog() callers\u0027 life:\n\n1. update_vf() decreases cl-\u003ecl_nactive, so we can check whether it is\nnon-zero before calling it.\n\n2. eltree_remove() always removes RB node cl-\u003eel_node, but we can use\n RB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38177",
"url": "https://www.suse.com/security/cve/CVE-2025-38177"
},
{
"category": "external",
"summary": "SUSE Bug 1237312 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1237312"
},
{
"category": "external",
"summary": "SUSE Bug 1245986 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1245986"
},
{
"category": "external",
"summary": "SUSE Bug 1246356 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1246356"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1247374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:47:12Z",
"details": "important"
}
],
"title": "CVE-2025-38177"
},
{
"cve": "CVE-2025-38181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38181"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: Fix null-ptr-deref in calipso_req_{set,del}attr().\n\nsyzkaller reported a null-ptr-deref in sock_omalloc() while allocating\na CALIPSO option. [0]\n\nThe NULL is of struct sock, which was fetched by sk_to_full_sk() in\ncalipso_req_setattr().\n\nSince commit a1a5344ddbe8 (\"tcp: avoid two atomic ops for syncookies\"),\nreqsk-\u003ersk_listener could be NULL when SYN Cookie is returned to its\nclient, as hinted by the leading SYN Cookie log.\n\nHere are 3 options to fix the bug:\n\n 1) Return 0 in calipso_req_setattr()\n 2) Return an error in calipso_req_setattr()\n 3) Alaways set rsk_listener\n\n1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie\nfor CALIPSO. 3) is also no go as there have been many efforts to reduce\natomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35\n(\"tcp/dccp: do not touch listener sk_refcnt under synflood\").\n\nAs of the blamed commit, SYN Cookie already did not need refcounting,\nand no one has stumbled on the bug for 9 years, so no CALIPSO user will\ncare about SYN Cookie.\n\nLet\u0027s return an error in calipso_req_setattr() and calipso_req_delattr()\nin the SYN Cookie case.\n\nThis can be reproduced by [1] on Fedora and now connect() of nc times out.\n\n[0]:\nTCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\nCPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nRIP: 0010:read_pnet include/net/net_namespace.h:406 [inline]\nRIP: 0010:sock_net include/net/sock.h:655 [inline]\nRIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806\nCode: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b\nRSP: 0018:ffff88811af89038 EFLAGS: 00010216\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400\nRDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030\nRBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e\nR10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000\nR13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050\nFS: 00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0\nPKRU: 80000000\nCall Trace:\n \u003cIRQ\u003e\n ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288\n calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204\n calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597\n netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249\n selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342\n selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551\n security_inet_conn_request+0x50/0xa0 security/security.c:4945\n tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825\n tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275\n tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328\n tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781\n tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667\n tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904\n ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436\n ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491\n dst_input include/net/dst.h:469 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]\n ip6_rcv_finish+0xb6/0x490 net/ipv6/ip6_input.c:69\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netf\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38181",
"url": "https://www.suse.com/security/cve/CVE-2025-38181"
},
{
"category": "external",
"summary": "SUSE Bug 1246000 for CVE-2025-38181",
"url": "https://bugzilla.suse.com/1246000"
},
{
"category": "external",
"summary": "SUSE Bug 1246001 for CVE-2025-38181",
"url": "https://bugzilla.suse.com/1246001"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:47:12Z",
"details": "important"
}
],
"title": "CVE-2025-38181"
},
{
"cve": "CVE-2025-38498",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38498"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndo_change_type(): refuse to operate on unmounted/not ours mounts\n\nEnsure that propagation settings can only be changed for mounts located\nin the caller\u0027s mount namespace. This change aligns permission checking\nwith the rest of mount(2).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38498",
"url": "https://www.suse.com/security/cve/CVE-2025-38498"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2025-38498",
"url": "https://bugzilla.suse.com/1247374"
},
{
"category": "external",
"summary": "SUSE Bug 1247499 for CVE-2025-38498",
"url": "https://bugzilla.suse.com/1247499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:47:12Z",
"details": "important"
}
],
"title": "CVE-2025-38498"
},
{
"cve": "CVE-2025-38555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38555"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget : fix use-after-free in composite_dev_cleanup()\n\n1. In func configfs_composite_bind() -\u003e composite_os_desc_req_prepare():\nif kmalloc fails, the pointer cdev-\u003eos_desc_req will be freed but not\nset to NULL. Then it will return a failure to the upper-level function.\n2. in func configfs_composite_bind() -\u003e composite_dev_cleanup():\nit will checks whether cdev-\u003eos_desc_req is NULL. If it is not NULL, it\nwill attempt to use it.This will lead to a use-after-free issue.\n\nBUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0\nRead of size 8 at addr 0000004827837a00 by task init/1\n\nCPU: 10 PID: 1 Comm: init Tainted: G O 5.10.97-oh #1\n kasan_report+0x188/0x1cc\n __asan_load8+0xb4/0xbc\n composite_dev_cleanup+0xf4/0x2c0\n configfs_composite_bind+0x210/0x7ac\n udc_bind_to_driver+0xb4/0x1ec\n usb_gadget_probe_driver+0xec/0x21c\n gadget_dev_desc_UDC_store+0x264/0x27c",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38555",
"url": "https://www.suse.com/security/cve/CVE-2025-38555"
},
{
"category": "external",
"summary": "SUSE Bug 1248297 for CVE-2025-38555",
"url": "https://bugzilla.suse.com/1248297"
},
{
"category": "external",
"summary": "SUSE Bug 1248298 for CVE-2025-38555",
"url": "https://bugzilla.suse.com/1248298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-livepatch-6_4_0-10-rt-12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T07:47:12Z",
"details": "important"
}
],
"title": "CVE-2025-38555"
}
]
}
SUSE-SU-2025:4123-1
Vulnerability from csaf_suse - Published: 2025-11-18 02:04 - Updated: 2025-11-18 02:04Summary
Security update for the Linux Kernel (Live Patch 61 for SUSE Linux Enterprise 12 SP5)
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel (Live Patch 61 for SUSE Linux Enterprise 12 SP5)
Description of the patch:
This update for the SUSE Linux Enterprise kernel 4.12.14-122.231 fixes various security issues
The following security issues were fixed:
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1232637).
- CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818).
- CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237930).
- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324).
- CVE-2022-49179: block, bfq: don't move oom_bfqq (bsc#1241331).
- CVE-2022-49465: blk-throttle: set BIO_THROTTLED when bio has been throttled (bsc#1238920).
- CVE-2022-49545: ALSA: usb-audio: cancel pending work at closing a MIDI substream (bsc#1238730).
- CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788).
- CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790).
- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847).
- CVE-2022-50386: Bluetooth: L2CAP: Fix user-after-free (bsc#1250302).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230998).
- CVE-2024-46818: drm/amd/display: check gpio_id before used as array index (bsc#1231204).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231676).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain (bsc#1231943).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231862).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1233019).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
- CVE-2024-50154: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink() (bsc#1233072).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (bsc#1233712).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233708).
- CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233680).
- CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233679).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783).
- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854).
- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234847).
- CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650).
- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892).
- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235005).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235231).
- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235062).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431).
- CVE-2024-56664: bpf, sockmap: fix race between element replace and close() (bsc#1235250).
- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921).
- CVE-2024-57996: net_sched: sch_sfq: don't allow 1 packet limit (bsc#1239077).
- CVE-2024-8805: BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1245797).
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912).
- CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744).
- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1245794).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1245776).
- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1245793).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1245775).
- CVE-2025-38079: crypto: algif_hash - fix double free in hash_accept (bsc#1245218).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245350).
- CVE-2025-38177: kernel: sch_hfsc: make hfsc_qlen_notify() idempotent (bsc#1246356).
- CVE-2025-38181: calipso: fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246001).
- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246030).
- CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315).
- CVE-2025-38494: HID: core: do not bypass hid_hw_raw_request (bsc#1247350).
- CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247351).
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247499).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1248673).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248749).
The following non security issues were fixed:
- Add the git commit and branch to the package description (bsc#920633)
- Fix description in rpm spec file Spec file description mentions initial kGraft patch which is only true for real initial patch. Make it more neutral. (bsc#930408)
- Mark the module as supported (bsc#904970)
- Provide common kallsyms wrapper API With bsc#1103203, the need for disambiguating between a multiply defined symbol arose. This is something the kallsyms_lookup_name() based code snippet we used to copy&paste to every individual CVE fix can't handle. Implement a proper wrapper API for doing the kallsyms lookups.
- Require exact kernel version in the patch (bsc#920615)
- Revert 'Require exact kernel version in the patch' This needs to be done differently, so that modprobe --force works as expected. (bsc#920615) This reverts commit c62c11aecd4e3f8822e1b835fea403acc3148c5a.
- Set immediate flag for the initial patch Setting immediate to true will simplify installation of the initial patch and possibly also of the further updates. (bsc#907150)
- The stubs' signatures have changed: each argument used to get mapped to either long or long long, but on x86_64, the stubs are now receiving a single struct pt_regs only -- it's their responsibility to extract the arguments as appropriate. In order to not require each and every live patch touching syscalls to include an insane amount of ifdeffery, provide a set of #defines hiding it: 1.) KLP_SYSCALL_SYM(name) expands to the syscall stub name for 64 bits as defined by _SYSCALL_DEFINEx(x, _name, ...). 2.) If the architeture requires 32bit specific stubs for syscalls sharing a common implementation between 32 and 64bits, the KLP_ARCH_HAS_SYSCALL_COMPAT_STUBS macro is defined. 3.) If KLP_ARCH_HAS_SYSCALL_COMPAT_STUBS is defined, then KLP_SYSCALL_COMPAT_STUB_SYM(name) expands to the syscall stub name for 32 bits as defined by _SYSCALL_DEFINEx(x, _name, ...). 4.) For syscalls not sharing a common implementation between 32 and 64 bits, i.e. those defined by COMPAT_SYSCALL_DEFINEx(), the macro KLP_COMPAT_SYSCALL_SYM(name) expands to the stub name defined as defined by COMPAT_SYSCALL_DEFINEx(x, _name, ...). 5.) Finally, for hiding differences between the signatures, provide the macro KLP_SYSCALL_DECLx(x, sym, ...) which expands to a declaration of sym, with the x arguments either mapped to long resp. long long each, or collapsed to a single struct pt_regs argument as appropriate for the architecture. Note that these macros are defined as appropriate on kernels before and after 4.17, so that live patch code can be shared. (bsc#1149841)
- bsc#1249208: fix livepatching target module name (bsc#1252946)
- uname_patch: convert to the syscall stub wrapper macros from klp_syscalls.h In order to make the live patch to the newuname() syscall work on kernels >= 4.17 again, convert it to the KLP_SYSCALL_*() wrapper macros provided by klp_syscalls.h. (bsc#1149841)
Patchnames: SUSE-2025-4123,SUSE-SLE-Live-Patching-12-SP5-2025-4123
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
5.5 (Medium)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.5 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.2 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.1 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.1 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.1 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.5 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
7.8 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.4 (High)
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
Affected products
Recommended
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
312 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel (Live Patch 61 for SUSE Linux Enterprise 12 SP5)",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for the SUSE Linux Enterprise kernel 4.12.14-122.231 fixes various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1232637).\n- CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818).\n- CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237930).\n- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238324).\n- CVE-2022-49179: block, bfq: don\u0027t move oom_bfqq (bsc#1241331).\n- CVE-2022-49465: blk-throttle: set BIO_THROTTLED when bio has been throttled (bsc#1238920).\n- CVE-2022-49545: ALSA: usb-audio: cancel pending work at closing a MIDI substream (bsc#1238730).\n- CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788).\n- CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790).\n- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847).\n- CVE-2022-50386: Bluetooth: L2CAP: Fix user-after-free (bsc#1250302).\n- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230998).\n- CVE-2024-46818: drm/amd/display: check gpio_id before used as array index (bsc#1231204).\n- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231676).\n- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231993).\n- CVE-2024-47706: block, bfq: fix possible UAF for bfqq-\u003ebic with merge chain (bsc#1231943).\n- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231862).\n- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1233019).\n- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).\n- CVE-2024-50154: tcp/dccp: Don\u0027t use timer_pending() in reqsk_queue_unlink() (bsc#1233072).\n- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk-\u003etrans (bsc#1233712).\n- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233708).\n- CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233680).\n- CVE-2024-50302: HID: core: zero-initialize the report buffer (bsc#1233679).\n- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783).\n- CVE-2024-53146: NFSD: prevent a potential integer overflow (bsc#1234854).\n- CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (bsc#1234847).\n- CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650).\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892).\n- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235005).\n- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218).\n- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235231).\n- CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235062).\n- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431).\n- CVE-2024-56664: bpf, sockmap: fix race between element replace and close() (bsc#1235250).\n- CVE-2024-57893: ALSA: seq: oss: fix races at processing SysEx messages (bsc#1235921).\n- CVE-2024-57996: net_sched: sch_sfq: don\u0027t allow 1 packet limit (bsc#1239077).\n- CVE-2024-8805: BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability (bsc#1240840).\n- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0 (bsc#1245797).\n- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912).\n- CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744).\n- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1245794).\n- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1245776).\n- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1245793).\n- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1245775).\n- CVE-2025-38079: crypto: algif_hash - fix double free in hash_accept (bsc#1245218).\n- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245350).\n- CVE-2025-38177: kernel: sch_hfsc: make hfsc_qlen_notify() idempotent (bsc#1246356).\n- CVE-2025-38181: calipso: fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246001).\n- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246030).\n- CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315).\n- CVE-2025-38494: HID: core: do not bypass hid_hw_raw_request (bsc#1247350).\n- CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247351).\n- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247499).\n- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1248673).\n- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208).\n- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207).\n- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248749).\n\nThe following non security issues were fixed:\n\n- Add the git commit and branch to the package description (bsc#920633)\n- Fix description in rpm spec file Spec file description mentions initial kGraft patch which is only true for real initial patch. Make it more neutral. (bsc#930408)\n- Mark the module as supported (bsc#904970)\n- Provide common kallsyms wrapper API With bsc#1103203, the need for disambiguating between a multiply defined symbol arose. This is something the kallsyms_lookup_name() based code snippet we used to copy\u0026paste to every individual CVE fix can\u0027t handle. Implement a proper wrapper API for doing the kallsyms lookups.\n- Require exact kernel version in the patch (bsc#920615)\n- Revert \u0027Require exact kernel version in the patch\u0027 This needs to be done differently, so that modprobe --force works as expected. (bsc#920615) This reverts commit c62c11aecd4e3f8822e1b835fea403acc3148c5a.\n- Set immediate flag for the initial patch Setting immediate to true will simplify installation of the initial patch and possibly also of the further updates. (bsc#907150)\n- The stubs\u0027 signatures have changed: each argument used to get mapped to either long or long long, but on x86_64, the stubs are now receiving a single struct pt_regs only -- it\u0027s their responsibility to extract the arguments as appropriate. In order to not require each and every live patch touching syscalls to include an insane amount of ifdeffery, provide a set of #defines hiding it: 1.) KLP_SYSCALL_SYM(name) expands to the syscall stub name for 64 bits as defined by _SYSCALL_DEFINEx(x, _name, ...). 2.) If the architeture requires 32bit specific stubs for syscalls sharing a common implementation between 32 and 64bits, the KLP_ARCH_HAS_SYSCALL_COMPAT_STUBS macro is defined. 3.) If KLP_ARCH_HAS_SYSCALL_COMPAT_STUBS is defined, then KLP_SYSCALL_COMPAT_STUB_SYM(name) expands to the syscall stub name for 32 bits as defined by _SYSCALL_DEFINEx(x, _name, ...). 4.) For syscalls not sharing a common implementation between 32 and 64 bits, i.e. those defined by COMPAT_SYSCALL_DEFINEx(), the macro KLP_COMPAT_SYSCALL_SYM(name) expands to the stub name defined as defined by COMPAT_SYSCALL_DEFINEx(x, _name, ...). 5.) Finally, for hiding differences between the signatures, provide the macro KLP_SYSCALL_DECLx(x, sym, ...) which expands to a declaration of sym, with the x arguments either mapped to long resp. long long each, or collapsed to a single struct pt_regs argument as appropriate for the architecture. Note that these macros are defined as appropriate on kernels before and after 4.17, so that live patch code can be shared. (bsc#1149841)\n- bsc#1249208: fix livepatching target module name (bsc#1252946)\n- uname_patch: convert to the syscall stub wrapper macros from klp_syscalls.h In order to make the live patch to the newuname() syscall work on kernels \u003e= 4.17 again, convert it to the KLP_SYSCALL_*() wrapper macros provided by klp_syscalls.h. (bsc#1149841)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4123,SUSE-SLE-Live-Patching-12-SP5-2025-4123",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4123-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4123-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254123-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4123-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html"
},
{
"category": "self",
"summary": "SUSE Bug 1103203",
"url": "https://bugzilla.suse.com/1103203"
},
{
"category": "self",
"summary": "SUSE Bug 1149841",
"url": "https://bugzilla.suse.com/1149841"
},
{
"category": "self",
"summary": "SUSE Bug 1230998",
"url": "https://bugzilla.suse.com/1230998"
},
{
"category": "self",
"summary": "SUSE Bug 1231204",
"url": "https://bugzilla.suse.com/1231204"
},
{
"category": "self",
"summary": "SUSE Bug 1231676",
"url": "https://bugzilla.suse.com/1231676"
},
{
"category": "self",
"summary": "SUSE Bug 1231862",
"url": "https://bugzilla.suse.com/1231862"
},
{
"category": "self",
"summary": "SUSE Bug 1231943",
"url": "https://bugzilla.suse.com/1231943"
},
{
"category": "self",
"summary": "SUSE Bug 1231993",
"url": "https://bugzilla.suse.com/1231993"
},
{
"category": "self",
"summary": "SUSE Bug 1232637",
"url": "https://bugzilla.suse.com/1232637"
},
{
"category": "self",
"summary": "SUSE Bug 1232818",
"url": "https://bugzilla.suse.com/1232818"
},
{
"category": "self",
"summary": "SUSE Bug 1232929",
"url": "https://bugzilla.suse.com/1232929"
},
{
"category": "self",
"summary": "SUSE Bug 1233019",
"url": "https://bugzilla.suse.com/1233019"
},
{
"category": "self",
"summary": "SUSE Bug 1233072",
"url": "https://bugzilla.suse.com/1233072"
},
{
"category": "self",
"summary": "SUSE Bug 1233679",
"url": "https://bugzilla.suse.com/1233679"
},
{
"category": "self",
"summary": "SUSE Bug 1233680",
"url": "https://bugzilla.suse.com/1233680"
},
{
"category": "self",
"summary": "SUSE Bug 1233708",
"url": "https://bugzilla.suse.com/1233708"
},
{
"category": "self",
"summary": "SUSE Bug 1233712",
"url": "https://bugzilla.suse.com/1233712"
},
{
"category": "self",
"summary": "SUSE Bug 1234847",
"url": "https://bugzilla.suse.com/1234847"
},
{
"category": "self",
"summary": "SUSE Bug 1234854",
"url": "https://bugzilla.suse.com/1234854"
},
{
"category": "self",
"summary": "SUSE Bug 1234892",
"url": "https://bugzilla.suse.com/1234892"
},
{
"category": "self",
"summary": "SUSE Bug 1235005",
"url": "https://bugzilla.suse.com/1235005"
},
{
"category": "self",
"summary": "SUSE Bug 1235062",
"url": "https://bugzilla.suse.com/1235062"
},
{
"category": "self",
"summary": "SUSE Bug 1235218",
"url": "https://bugzilla.suse.com/1235218"
},
{
"category": "self",
"summary": "SUSE Bug 1235231",
"url": "https://bugzilla.suse.com/1235231"
},
{
"category": "self",
"summary": "SUSE Bug 1235250",
"url": "https://bugzilla.suse.com/1235250"
},
{
"category": "self",
"summary": "SUSE Bug 1235431",
"url": "https://bugzilla.suse.com/1235431"
},
{
"category": "self",
"summary": "SUSE Bug 1235921",
"url": "https://bugzilla.suse.com/1235921"
},
{
"category": "self",
"summary": "SUSE Bug 1236783",
"url": "https://bugzilla.suse.com/1236783"
},
{
"category": "self",
"summary": "SUSE Bug 1237930",
"url": "https://bugzilla.suse.com/1237930"
},
{
"category": "self",
"summary": "SUSE Bug 1238324",
"url": "https://bugzilla.suse.com/1238324"
},
{
"category": "self",
"summary": "SUSE Bug 1238730",
"url": "https://bugzilla.suse.com/1238730"
},
{
"category": "self",
"summary": "SUSE Bug 1238788",
"url": "https://bugzilla.suse.com/1238788"
},
{
"category": "self",
"summary": "SUSE Bug 1238790",
"url": "https://bugzilla.suse.com/1238790"
},
{
"category": "self",
"summary": "SUSE Bug 1238912",
"url": "https://bugzilla.suse.com/1238912"
},
{
"category": "self",
"summary": "SUSE Bug 1238920",
"url": "https://bugzilla.suse.com/1238920"
},
{
"category": "self",
"summary": "SUSE Bug 1239077",
"url": "https://bugzilla.suse.com/1239077"
},
{
"category": "self",
"summary": "SUSE Bug 1240744",
"url": "https://bugzilla.suse.com/1240744"
},
{
"category": "self",
"summary": "SUSE Bug 1240840",
"url": "https://bugzilla.suse.com/1240840"
},
{
"category": "self",
"summary": "SUSE Bug 1241331",
"url": "https://bugzilla.suse.com/1241331"
},
{
"category": "self",
"summary": "SUSE Bug 1243650",
"url": "https://bugzilla.suse.com/1243650"
},
{
"category": "self",
"summary": "SUSE Bug 1245218",
"url": "https://bugzilla.suse.com/1245218"
},
{
"category": "self",
"summary": "SUSE Bug 1245350",
"url": "https://bugzilla.suse.com/1245350"
},
{
"category": "self",
"summary": "SUSE Bug 1245775",
"url": "https://bugzilla.suse.com/1245775"
},
{
"category": "self",
"summary": "SUSE Bug 1245776",
"url": "https://bugzilla.suse.com/1245776"
},
{
"category": "self",
"summary": "SUSE Bug 1245793",
"url": "https://bugzilla.suse.com/1245793"
},
{
"category": "self",
"summary": "SUSE Bug 1245794",
"url": "https://bugzilla.suse.com/1245794"
},
{
"category": "self",
"summary": "SUSE Bug 1245797",
"url": "https://bugzilla.suse.com/1245797"
},
{
"category": "self",
"summary": "SUSE Bug 1246001",
"url": "https://bugzilla.suse.com/1246001"
},
{
"category": "self",
"summary": "SUSE Bug 1246030",
"url": "https://bugzilla.suse.com/1246030"
},
{
"category": "self",
"summary": "SUSE Bug 1246356",
"url": "https://bugzilla.suse.com/1246356"
},
{
"category": "self",
"summary": "SUSE Bug 1247315",
"url": "https://bugzilla.suse.com/1247315"
},
{
"category": "self",
"summary": "SUSE Bug 1247350",
"url": "https://bugzilla.suse.com/1247350"
},
{
"category": "self",
"summary": "SUSE Bug 1247351",
"url": "https://bugzilla.suse.com/1247351"
},
{
"category": "self",
"summary": "SUSE Bug 1247499",
"url": "https://bugzilla.suse.com/1247499"
},
{
"category": "self",
"summary": "SUSE Bug 1248673",
"url": "https://bugzilla.suse.com/1248673"
},
{
"category": "self",
"summary": "SUSE Bug 1248749",
"url": "https://bugzilla.suse.com/1248749"
},
{
"category": "self",
"summary": "SUSE Bug 1249207",
"url": "https://bugzilla.suse.com/1249207"
},
{
"category": "self",
"summary": "SUSE Bug 1249208",
"url": "https://bugzilla.suse.com/1249208"
},
{
"category": "self",
"summary": "SUSE Bug 1249847",
"url": "https://bugzilla.suse.com/1249847"
},
{
"category": "self",
"summary": "SUSE Bug 1250302",
"url": "https://bugzilla.suse.com/1250302"
},
{
"category": "self",
"summary": "SUSE Bug 1252946",
"url": "https://bugzilla.suse.com/1252946"
},
{
"category": "self",
"summary": "SUSE Bug 904970",
"url": "https://bugzilla.suse.com/904970"
},
{
"category": "self",
"summary": "SUSE Bug 907150",
"url": "https://bugzilla.suse.com/907150"
},
{
"category": "self",
"summary": "SUSE Bug 920615",
"url": "https://bugzilla.suse.com/920615"
},
{
"category": "self",
"summary": "SUSE Bug 920633",
"url": "https://bugzilla.suse.com/920633"
},
{
"category": "self",
"summary": "SUSE Bug 930408",
"url": "https://bugzilla.suse.com/930408"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48956 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48956/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49014 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49053 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49080 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49179 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49465 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49465/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49545 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49563 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-49564 page",
"url": "https://www.suse.com/security/cve/CVE-2022-49564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50252 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50386 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-45016 page",
"url": "https://www.suse.com/security/cve/CVE-2024-45016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-46818 page",
"url": "https://www.suse.com/security/cve/CVE-2024-46818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47674 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47684 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47706 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47706/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-49860 page",
"url": "https://www.suse.com/security/cve/CVE-2024-49860/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50115 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50125 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50154 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50264 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50279 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50279/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50301 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-50302 page",
"url": "https://www.suse.com/security/cve/CVE-2024-50302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53104 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53146 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53156 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53168 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53173 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-53214 page",
"url": "https://www.suse.com/security/cve/CVE-2024-53214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56600 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56601 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56605 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56650 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56650/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56664 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57893 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-57996 page",
"url": "https://www.suse.com/security/cve/CVE-2024-57996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-8805 page",
"url": "https://www.suse.com/security/cve/CVE-2024-8805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21702 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21772 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21791 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-21971 page",
"url": "https://www.suse.com/security/cve/CVE-2025-21971/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37752 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37797 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38000 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38079 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38181 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38212 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38212/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38477 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38494 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38494/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38495 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38495/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38498 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38498/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38499 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38617 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38618 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38644 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38644/"
}
],
"title": "Security update for the Linux Kernel (Live Patch 61 for SUSE Linux Enterprise 12 SP5)",
"tracking": {
"current_release_date": "2025-11-18T02:04:00Z",
"generator": {
"date": "2025-11-18T02:04:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4123-1",
"initial_release_date": "2025-11-18T02:04:00Z",
"revision_history": [
{
"date": "2025-11-18T02:04:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_231-default-18-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_231-default-18-4.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-48956",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48956"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: avoid use-after-free in ip6_fragment()\n\nBlamed commit claimed rcu_read_lock() was held by ip6_fragment() callers.\n\nIt seems to not be always true, at least for UDP stack.\n\nsyzbot reported:\n\nBUG: KASAN: use-after-free in ip6_dst_idev include/net/ip6_fib.h:245 [inline]\nBUG: KASAN: use-after-free in ip6_fragment+0x2724/0x2770 net/ipv6/ip6_output.c:951\nRead of size 8 at addr ffff88801d403e80 by task syz-executor.3/7618\n\nCPU: 1 PID: 7618 Comm: syz-executor.3 Not tainted 6.1.0-rc6-syzkaller-00012-g4312098baf37 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:284 [inline]\n print_report+0x15e/0x45d mm/kasan/report.c:395\n kasan_report+0xbf/0x1f0 mm/kasan/report.c:495\n ip6_dst_idev include/net/ip6_fib.h:245 [inline]\n ip6_fragment+0x2724/0x2770 net/ipv6/ip6_output.c:951\n __ip6_finish_output net/ipv6/ip6_output.c:193 [inline]\n ip6_finish_output+0x9a3/0x1170 net/ipv6/ip6_output.c:206\n NF_HOOK_COND include/linux/netfilter.h:291 [inline]\n ip6_output+0x1f1/0x540 net/ipv6/ip6_output.c:227\n dst_output include/net/dst.h:445 [inline]\n ip6_local_out+0xb3/0x1a0 net/ipv6/output_core.c:161\n ip6_send_skb+0xbb/0x340 net/ipv6/ip6_output.c:1966\n udp_v6_send_skb+0x82a/0x18a0 net/ipv6/udp.c:1286\n udp_v6_push_pending_frames+0x140/0x200 net/ipv6/udp.c:1313\n udpv6_sendmsg+0x18da/0x2c80 net/ipv6/udp.c:1606\n inet6_sendmsg+0x9d/0xe0 net/ipv6/af_inet6.c:665\n sock_sendmsg_nosec net/socket.c:714 [inline]\n sock_sendmsg+0xd3/0x120 net/socket.c:734\n sock_write_iter+0x295/0x3d0 net/socket.c:1108\n call_write_iter include/linux/fs.h:2191 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x9ed/0xdd0 fs/read_write.c:584\n ksys_write+0x1ec/0x250 fs/read_write.c:637\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\nRIP: 0033:0x7fde3588c0d9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fde365b6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00007fde359ac050 RCX: 00007fde3588c0d9\nRDX: 000000000000ffdc RSI: 00000000200000c0 RDI: 000000000000000a\nRBP: 00007fde358e7ae9 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fde35acfb1f R14: 00007fde365b6300 R15: 0000000000022000\n \u003c/TASK\u003e\n\nAllocated by task 7618:\n kasan_save_stack+0x22/0x40 mm/kasan/common.c:45\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\n __kasan_slab_alloc+0x82/0x90 mm/kasan/common.c:325\n kasan_slab_alloc include/linux/kasan.h:201 [inline]\n slab_post_alloc_hook mm/slab.h:737 [inline]\n slab_alloc_node mm/slub.c:3398 [inline]\n slab_alloc mm/slub.c:3406 [inline]\n __kmem_cache_alloc_lru mm/slub.c:3413 [inline]\n kmem_cache_alloc+0x2b4/0x3d0 mm/slub.c:3422\n dst_alloc+0x14a/0x1f0 net/core/dst.c:92\n ip6_dst_alloc+0x32/0xa0 net/ipv6/route.c:344\n ip6_rt_pcpu_alloc net/ipv6/route.c:1369 [inline]\n rt6_make_pcpu_route net/ipv6/route.c:1417 [inline]\n ip6_pol_route+0x901/0x1190 net/ipv6/route.c:2254\n pol_lookup_func include/net/ip6_fib.h:582 [inline]\n fib6_rule_lookup+0x52e/0x6f0 net/ipv6/fib6_rules.c:121\n ip6_route_output_flags_noref+0x2e6/0x380 net/ipv6/route.c:2625\n ip6_route_output_flags+0x76/0x320 net/ipv6/route.c:2638\n ip6_route_output include/net/ip6_route.h:98 [inline]\n ip6_dst_lookup_tail+0x5ab/0x1620 net/ipv6/ip6_output.c:1092\n ip6_dst_lookup_flow+0x90/0x1d0 net/ipv6/ip6_output.c:1222\n ip6_sk_dst_lookup_flow+0x553/0x980 net/ipv6/ip6_output.c:1260\n udpv6_sendmsg+0x151d/0x2c80 net/ipv6/udp.c:1554\n inet6_sendmsg+0x9d/0xe0 net/ipv6/af_inet6.c:665\n sock_sendmsg_nosec n\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48956",
"url": "https://www.suse.com/security/cve/CVE-2022-48956"
},
{
"category": "external",
"summary": "SUSE Bug 1231893 for CVE-2022-48956",
"url": "https://bugzilla.suse.com/1231893"
},
{
"category": "external",
"summary": "SUSE Bug 1232799 for CVE-2022-48956",
"url": "https://bugzilla.suse.com/1232799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2022-48956"
},
{
"cve": "CVE-2022-49014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49014"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tun: Fix use-after-free in tun_detach()\n\nsyzbot reported use-after-free in tun_detach() [1]. This causes call\ntrace like below:\n\n==================================================================\nBUG: KASAN: use-after-free in notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75\nRead of size 8 at addr ffff88807324e2a8 by task syz-executor.0/3673\n\nCPU: 0 PID: 3673 Comm: syz-executor.0 Not tainted 6.1.0-rc5-syzkaller-00044-gcc675d22e422 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:284 [inline]\n print_report+0x15e/0x461 mm/kasan/report.c:395\n kasan_report+0xbf/0x1f0 mm/kasan/report.c:495\n notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75\n call_netdevice_notifiers_info+0x86/0x130 net/core/dev.c:1942\n call_netdevice_notifiers_extack net/core/dev.c:1983 [inline]\n call_netdevice_notifiers net/core/dev.c:1997 [inline]\n netdev_wait_allrefs_any net/core/dev.c:10237 [inline]\n netdev_run_todo+0xbc6/0x1100 net/core/dev.c:10351\n tun_detach drivers/net/tun.c:704 [inline]\n tun_chr_close+0xe4/0x190 drivers/net/tun.c:3467\n __fput+0x27c/0xa90 fs/file_table.c:320\n task_work_run+0x16f/0x270 kernel/task_work.c:179\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0xb3d/0x2a30 kernel/exit.c:820\n do_group_exit+0xd4/0x2a0 kernel/exit.c:950\n get_signal+0x21b1/0x2440 kernel/signal.c:2858\n arch_do_signal_or_restart+0x86/0x2300 arch/x86/kernel/signal.c:869\n exit_to_user_mode_loop kernel/entry/common.c:168 [inline]\n exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203\n __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]\n syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296\n do_syscall_64+0x46/0xb0 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nThe cause of the issue is that sock_put() from __tun_detach() drops\nlast reference count for struct net, and then notifier_call_chain()\nfrom netdev_state_change() accesses that struct net.\n\nThis patch fixes the issue by calling sock_put() from tun_detach()\nafter all necessary accesses for the struct net has done.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49014",
"url": "https://www.suse.com/security/cve/CVE-2022-49014"
},
{
"category": "external",
"summary": "SUSE Bug 1231890 for CVE-2022-49014",
"url": "https://bugzilla.suse.com/1231890"
},
{
"category": "external",
"summary": "SUSE Bug 1232818 for CVE-2022-49014",
"url": "https://bugzilla.suse.com/1232818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2022-49014"
},
{
"cve": "CVE-2022-49053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: tcmu: Fix possible page UAF\n\ntcmu_try_get_data_page() looks up pages under cmdr_lock, but it does not\ntake refcount properly and just returns page pointer. When\ntcmu_try_get_data_page() returns, the returned page may have been freed by\ntcmu_blocks_release().\n\nWe need to get_page() under cmdr_lock to avoid concurrent\ntcmu_blocks_release().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49053",
"url": "https://www.suse.com/security/cve/CVE-2022-49053"
},
{
"category": "external",
"summary": "SUSE Bug 1237918 for CVE-2022-49053",
"url": "https://bugzilla.suse.com/1237918"
},
{
"category": "external",
"summary": "SUSE Bug 1237930 for CVE-2022-49053",
"url": "https://bugzilla.suse.com/1237930"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2022-49053"
},
{
"cve": "CVE-2022-49080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/mempolicy: fix mpol_new leak in shared_policy_replace\n\nIf mpol_new is allocated but not used in restart loop, mpol_new will be\nfreed via mpol_put before returning to the caller. But refcnt is not\ninitialized yet, so mpol_put could not do the right things and might\nleak the unused mpol_new. This would happen if mempolicy was updated on\nthe shared shmem file while the sp-\u003elock has been dropped during the\nmemory allocation.\n\nThis issue could be triggered easily with the below code snippet if\nthere are many processes doing the below work at the same time:\n\n shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT);\n shm = shmat(shmid, 0, 0);\n loop many times {\n mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0);\n mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask,\n maxnode, 0);\n }",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49080",
"url": "https://www.suse.com/security/cve/CVE-2022-49080"
},
{
"category": "external",
"summary": "SUSE Bug 1238033 for CVE-2022-49080",
"url": "https://bugzilla.suse.com/1238033"
},
{
"category": "external",
"summary": "SUSE Bug 1238324 for CVE-2022-49080",
"url": "https://bugzilla.suse.com/1238324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2022-49080"
},
{
"cve": "CVE-2022-49179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49179"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: don\u0027t move oom_bfqq\n\nOur test report a UAF:\n\n[ 2073.019181] ==================================================================\n[ 2073.019188] BUG: KASAN: use-after-free in __bfq_put_async_bfqq+0xa0/0x168\n[ 2073.019191] Write of size 8 at addr ffff8000ccf64128 by task rmmod/72584\n[ 2073.019192]\n[ 2073.019196] CPU: 0 PID: 72584 Comm: rmmod Kdump: loaded Not tainted 4.19.90-yk #5\n[ 2073.019198] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015\n[ 2073.019200] Call trace:\n[ 2073.019203] dump_backtrace+0x0/0x310\n[ 2073.019206] show_stack+0x28/0x38\n[ 2073.019210] dump_stack+0xec/0x15c\n[ 2073.019216] print_address_description+0x68/0x2d0\n[ 2073.019220] kasan_report+0x238/0x2f0\n[ 2073.019224] __asan_store8+0x88/0xb0\n[ 2073.019229] __bfq_put_async_bfqq+0xa0/0x168\n[ 2073.019233] bfq_put_async_queues+0xbc/0x208\n[ 2073.019236] bfq_pd_offline+0x178/0x238\n[ 2073.019240] blkcg_deactivate_policy+0x1f0/0x420\n[ 2073.019244] bfq_exit_queue+0x128/0x178\n[ 2073.019249] blk_mq_exit_sched+0x12c/0x160\n[ 2073.019252] elevator_exit+0xc8/0xd0\n[ 2073.019256] blk_exit_queue+0x50/0x88\n[ 2073.019259] blk_cleanup_queue+0x228/0x3d8\n[ 2073.019267] null_del_dev+0xfc/0x1e0 [null_blk]\n[ 2073.019274] null_exit+0x90/0x114 [null_blk]\n[ 2073.019278] __arm64_sys_delete_module+0x358/0x5a0\n[ 2073.019282] el0_svc_common+0xc8/0x320\n[ 2073.019287] el0_svc_handler+0xf8/0x160\n[ 2073.019290] el0_svc+0x10/0x218\n[ 2073.019291]\n[ 2073.019294] Allocated by task 14163:\n[ 2073.019301] kasan_kmalloc+0xe0/0x190\n[ 2073.019305] kmem_cache_alloc_node_trace+0x1cc/0x418\n[ 2073.019308] bfq_pd_alloc+0x54/0x118\n[ 2073.019313] blkcg_activate_policy+0x250/0x460\n[ 2073.019317] bfq_create_group_hierarchy+0x38/0x110\n[ 2073.019321] bfq_init_queue+0x6d0/0x948\n[ 2073.019325] blk_mq_init_sched+0x1d8/0x390\n[ 2073.019330] elevator_switch_mq+0x88/0x170\n[ 2073.019334] elevator_switch+0x140/0x270\n[ 2073.019338] elv_iosched_store+0x1a4/0x2a0\n[ 2073.019342] queue_attr_store+0x90/0xe0\n[ 2073.019348] sysfs_kf_write+0xa8/0xe8\n[ 2073.019351] kernfs_fop_write+0x1f8/0x378\n[ 2073.019359] __vfs_write+0xe0/0x360\n[ 2073.019363] vfs_write+0xf0/0x270\n[ 2073.019367] ksys_write+0xdc/0x1b8\n[ 2073.019371] __arm64_sys_write+0x50/0x60\n[ 2073.019375] el0_svc_common+0xc8/0x320\n[ 2073.019380] el0_svc_handler+0xf8/0x160\n[ 2073.019383] el0_svc+0x10/0x218\n[ 2073.019385]\n[ 2073.019387] Freed by task 72584:\n[ 2073.019391] __kasan_slab_free+0x120/0x228\n[ 2073.019394] kasan_slab_free+0x10/0x18\n[ 2073.019397] kfree+0x94/0x368\n[ 2073.019400] bfqg_put+0x64/0xb0\n[ 2073.019404] bfqg_and_blkg_put+0x90/0xb0\n[ 2073.019408] bfq_put_queue+0x220/0x228\n[ 2073.019413] __bfq_put_async_bfqq+0x98/0x168\n[ 2073.019416] bfq_put_async_queues+0xbc/0x208\n[ 2073.019420] bfq_pd_offline+0x178/0x238\n[ 2073.019424] blkcg_deactivate_policy+0x1f0/0x420\n[ 2073.019429] bfq_exit_queue+0x128/0x178\n[ 2073.019433] blk_mq_exit_sched+0x12c/0x160\n[ 2073.019437] elevator_exit+0xc8/0xd0\n[ 2073.019440] blk_exit_queue+0x50/0x88\n[ 2073.019443] blk_cleanup_queue+0x228/0x3d8\n[ 2073.019451] null_del_dev+0xfc/0x1e0 [null_blk]\n[ 2073.019459] null_exit+0x90/0x114 [null_blk]\n[ 2073.019462] __arm64_sys_delete_module+0x358/0x5a0\n[ 2073.019467] el0_svc_common+0xc8/0x320\n[ 2073.019471] el0_svc_handler+0xf8/0x160\n[ 2073.019474] el0_svc+0x10/0x218\n[ 2073.019475]\n[ 2073.019479] The buggy address belongs to the object at ffff8000ccf63f00\n which belongs to the cache kmalloc-1024 of size 1024\n[ 2073.019484] The buggy address is located 552 bytes inside of\n 1024-byte region [ffff8000ccf63f00, ffff8000ccf64300)\n[ 2073.019486] The buggy address belongs to the page:\n[ 2073.019492] page:ffff7e000333d800 count:1 mapcount:0 mapping:ffff8000c0003a00 index:0x0 compound_mapcount: 0\n[ 2073.020123] flags: 0x7ffff0000008100(slab|head)\n[ 2073.020403] raw: 07ffff0000008100 ffff7e0003334c08 ffff7e00001f5a08 ffff8000c0003a00\n[ 2073.020409] ra\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49179",
"url": "https://www.suse.com/security/cve/CVE-2022-49179"
},
{
"category": "external",
"summary": "SUSE Bug 1238092 for CVE-2022-49179",
"url": "https://bugzilla.suse.com/1238092"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-49179"
},
{
"cve": "CVE-2022-49465",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49465"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-throttle: Set BIO_THROTTLED when bio has been throttled\n\n1.In current process, all bio will set the BIO_THROTTLED flag\nafter __blk_throtl_bio().\n\n2.If bio needs to be throttled, it will start the timer and\nstop submit bio directly. Bio will submit in\nblk_throtl_dispatch_work_fn() when the timer expires.But in\nthe current process, if bio is throttled. The BIO_THROTTLED\nwill be set to bio after timer start. If the bio has been\ncompleted, it may cause use-after-free blow.\n\nBUG: KASAN: use-after-free in blk_throtl_bio+0x12f0/0x2c70\nRead of size 2 at addr ffff88801b8902d4 by task fio/26380\n\n dump_stack+0x9b/0xce\n print_address_description.constprop.6+0x3e/0x60\n kasan_report.cold.9+0x22/0x3a\n blk_throtl_bio+0x12f0/0x2c70\n submit_bio_checks+0x701/0x1550\n submit_bio_noacct+0x83/0xc80\n submit_bio+0xa7/0x330\n mpage_readahead+0x380/0x500\n read_pages+0x1c1/0xbf0\n page_cache_ra_unbounded+0x471/0x6f0\n do_page_cache_ra+0xda/0x110\n ondemand_readahead+0x442/0xae0\n page_cache_async_ra+0x210/0x300\n generic_file_buffered_read+0x4d9/0x2130\n generic_file_read_iter+0x315/0x490\n blkdev_read_iter+0x113/0x1b0\n aio_read+0x2ad/0x450\n io_submit_one+0xc8e/0x1d60\n __se_sys_io_submit+0x125/0x350\n do_syscall_64+0x2d/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nAllocated by task 26380:\n kasan_save_stack+0x19/0x40\n __kasan_kmalloc.constprop.2+0xc1/0xd0\n kmem_cache_alloc+0x146/0x440\n mempool_alloc+0x125/0x2f0\n bio_alloc_bioset+0x353/0x590\n mpage_alloc+0x3b/0x240\n do_mpage_readpage+0xddf/0x1ef0\n mpage_readahead+0x264/0x500\n read_pages+0x1c1/0xbf0\n page_cache_ra_unbounded+0x471/0x6f0\n do_page_cache_ra+0xda/0x110\n ondemand_readahead+0x442/0xae0\n page_cache_async_ra+0x210/0x300\n generic_file_buffered_read+0x4d9/0x2130\n generic_file_read_iter+0x315/0x490\n blkdev_read_iter+0x113/0x1b0\n aio_read+0x2ad/0x450\n io_submit_one+0xc8e/0x1d60\n __se_sys_io_submit+0x125/0x350\n do_syscall_64+0x2d/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nFreed by task 0:\n kasan_save_stack+0x19/0x40\n kasan_set_track+0x1c/0x30\n kasan_set_free_info+0x1b/0x30\n __kasan_slab_free+0x111/0x160\n kmem_cache_free+0x94/0x460\n mempool_free+0xd6/0x320\n bio_free+0xe0/0x130\n bio_put+0xab/0xe0\n bio_endio+0x3a6/0x5d0\n blk_update_request+0x590/0x1370\n scsi_end_request+0x7d/0x400\n scsi_io_completion+0x1aa/0xe50\n scsi_softirq_done+0x11b/0x240\n blk_mq_complete_request+0xd4/0x120\n scsi_mq_done+0xf0/0x200\n virtscsi_vq_done+0xbc/0x150\n vring_interrupt+0x179/0x390\n __handle_irq_event_percpu+0xf7/0x490\n handle_irq_event_percpu+0x7b/0x160\n handle_irq_event+0xcc/0x170\n handle_edge_irq+0x215/0xb20\n common_interrupt+0x60/0x120\n asm_common_interrupt+0x1e/0x40\n\nFix this by move BIO_THROTTLED set into the queue_lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49465",
"url": "https://www.suse.com/security/cve/CVE-2022-49465"
},
{
"category": "external",
"summary": "SUSE Bug 1238919 for CVE-2022-49465",
"url": "https://bugzilla.suse.com/1238919"
},
{
"category": "external",
"summary": "SUSE Bug 1238920 for CVE-2022-49465",
"url": "https://bugzilla.suse.com/1238920"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2022-49465"
},
{
"cve": "CVE-2022-49545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49545"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Cancel pending work at closing a MIDI substream\n\nAt closing a USB MIDI output substream, there might be still a pending\nwork, which would eventually access the rawmidi runtime object that is\nbeing released. For fixing the race, make sure to cancel the pending\nwork at closing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49545",
"url": "https://www.suse.com/security/cve/CVE-2022-49545"
},
{
"category": "external",
"summary": "SUSE Bug 1238729 for CVE-2022-49545",
"url": "https://bugzilla.suse.com/1238729"
},
{
"category": "external",
"summary": "SUSE Bug 1238730 for CVE-2022-49545",
"url": "https://bugzilla.suse.com/1238730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2022-49545"
},
{
"cve": "CVE-2022-49563",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49563"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - add param check for RSA\n\nReject requests with a source buffer that is bigger than the size of the\nkey. This is to prevent a possible integer underflow that might happen\nwhen copying the source scatterlist into a linear buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49563",
"url": "https://www.suse.com/security/cve/CVE-2022-49563"
},
{
"category": "external",
"summary": "SUSE Bug 1238787 for CVE-2022-49563",
"url": "https://bugzilla.suse.com/1238787"
},
{
"category": "external",
"summary": "SUSE Bug 1238788 for CVE-2022-49563",
"url": "https://bugzilla.suse.com/1238788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2022-49563"
},
{
"cve": "CVE-2022-49564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-49564"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - add param check for DH\n\nReject requests with a source buffer that is bigger than the size of the\nkey. This is to prevent a possible integer underflow that might happen\nwhen copying the source scatterlist into a linear buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-49564",
"url": "https://www.suse.com/security/cve/CVE-2022-49564"
},
{
"category": "external",
"summary": "SUSE Bug 1238789 for CVE-2022-49564",
"url": "https://bugzilla.suse.com/1238789"
},
{
"category": "external",
"summary": "SUSE Bug 1238790 for CVE-2022-49564",
"url": "https://bugzilla.suse.com/1238790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2022-49564"
},
{
"cve": "CVE-2022-50252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50252"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Do not free q_vector unless new one was allocated\n\nAvoid potential use-after-free condition under memory pressure. If the\nkzalloc() fails, q_vector will be freed but left in the original\nadapter-\u003eq_vector[v_idx] array position.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50252",
"url": "https://www.suse.com/security/cve/CVE-2022-50252"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2022-50252",
"url": "https://bugzilla.suse.com/1247374"
},
{
"category": "external",
"summary": "SUSE Bug 1249846 for CVE-2022-50252",
"url": "https://bugzilla.suse.com/1249846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2022-50252"
},
{
"cve": "CVE-2022-50386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50386"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix user-after-free\n\nThis uses l2cap_chan_hold_unless_zero() after calling\n__l2cap_get_chan_blah() to prevent the following trace:\n\nBluetooth: l2cap_core.c:static void l2cap_chan_destroy(struct kref\n*kref)\nBluetooth: chan 0000000023c4974d\nBluetooth: parent 00000000ae861c08\n==================================================================\nBUG: KASAN: use-after-free in __mutex_waiter_is_first\nkernel/locking/mutex.c:191 [inline]\nBUG: KASAN: use-after-free in __mutex_lock_common\nkernel/locking/mutex.c:671 [inline]\nBUG: KASAN: use-after-free in __mutex_lock+0x278/0x400\nkernel/locking/mutex.c:729\nRead of size 8 at addr ffff888006a49b08 by task kworker/u3:2/389",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50386",
"url": "https://www.suse.com/security/cve/CVE-2022-50386"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2022-50386",
"url": "https://bugzilla.suse.com/1247374"
},
{
"category": "external",
"summary": "SUSE Bug 1250301 for CVE-2022-50386",
"url": "https://bugzilla.suse.com/1250301"
},
{
"category": "external",
"summary": "SUSE Bug 1250302 for CVE-2022-50386",
"url": "https://bugzilla.suse.com/1250302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2022-50386"
},
{
"cve": "CVE-2024-45016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-45016"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: fix return value if duplicate enqueue fails\n\nThere is a bug in netem_enqueue() introduced by\ncommit 5845f706388a (\"net: netem: fix skb length BUG_ON in __skb_to_sgvec\")\nthat can lead to a use-after-free.\n\nThis commit made netem_enqueue() always return NET_XMIT_SUCCESS\nwhen a packet is duplicated, which can cause the parent qdisc\u0027s q.qlen\nto be mistakenly incremented. When this happens qlen_notify() may be\nskipped on the parent during destruction, leaving a dangling pointer\nfor some classful qdiscs like DRR.\n\nThere are two ways for the bug happen:\n\n- If the duplicated packet is dropped by rootq-\u003eenqueue() and then\n the original packet is also dropped.\n- If rootq-\u003eenqueue() sends the duplicated packet to a different qdisc\n and the original packet is dropped.\n\nIn both cases NET_XMIT_SUCCESS is returned even though no packets\nare enqueued at the netem qdisc.\n\nThe fix is to defer the enqueue of the duplicate packet until after\nthe original packet has been guaranteed to return NET_XMIT_SUCCESS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-45016",
"url": "https://www.suse.com/security/cve/CVE-2024-45016"
},
{
"category": "external",
"summary": "SUSE Bug 1230429 for CVE-2024-45016",
"url": "https://bugzilla.suse.com/1230429"
},
{
"category": "external",
"summary": "SUSE Bug 1230998 for CVE-2024-45016",
"url": "https://bugzilla.suse.com/1230998"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-45016"
},
{
"cve": "CVE-2024-46818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-46818"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Check gpio_id before used as array index\n\n[WHY \u0026 HOW]\nGPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore\nshould be checked in advance.\n\nThis fixes 5 OVERRUN issues reported by Coverity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-46818",
"url": "https://www.suse.com/security/cve/CVE-2024-46818"
},
{
"category": "external",
"summary": "SUSE Bug 1231203 for CVE-2024-46818",
"url": "https://bugzilla.suse.com/1231203"
},
{
"category": "external",
"summary": "SUSE Bug 1231204 for CVE-2024-46818",
"url": "https://bugzilla.suse.com/1231204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-46818"
},
{
"cve": "CVE-2024-47674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47674"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: avoid leaving partial pfn mappings around in error case\n\nAs Jann points out, PFN mappings are special, because unlike normal\nmemory mappings, there is no lifetime information associated with the\nmapping - it is just a raw mapping of PFNs with no reference counting of\na \u0027struct page\u0027.\n\nThat\u0027s all very much intentional, but it does mean that it\u0027s easy to\nmess up the cleanup in case of errors. Yes, a failed mmap() will always\neventually clean up any partial mappings, but without any explicit\nlifetime in the page table mapping itself, it\u0027s very easy to do the\nerror handling in the wrong order.\n\nIn particular, it\u0027s easy to mistakenly free the physical backing store\nbefore the page tables are actually cleaned up and (temporarily) have\nstale dangling PTE entries.\n\nTo make this situation less error-prone, just make sure that any partial\npfn mapping is torn down early, before any other error handling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47674",
"url": "https://www.suse.com/security/cve/CVE-2024-47674"
},
{
"category": "external",
"summary": "SUSE Bug 1231673 for CVE-2024-47674",
"url": "https://bugzilla.suse.com/1231673"
},
{
"category": "external",
"summary": "SUSE Bug 1231676 for CVE-2024-47674",
"url": "https://bugzilla.suse.com/1231676"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-47674"
},
{
"cve": "CVE-2024-47684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47684"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: check skb is non-NULL in tcp_rto_delta_us()\n\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\nkernel that are running ceph and recently hit a null ptr dereference in\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\nsaw it getting hit from the RACK case as well. Here are examples of the oops\nmessages we saw in each of those cases:\n\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u003c48\u003e 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\nJul 26 15:05:02 rx [11061395.919488]\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47684",
"url": "https://www.suse.com/security/cve/CVE-2024-47684"
},
{
"category": "external",
"summary": "SUSE Bug 1231987 for CVE-2024-47684",
"url": "https://bugzilla.suse.com/1231987"
},
{
"category": "external",
"summary": "SUSE Bug 1231993 for CVE-2024-47684",
"url": "https://bugzilla.suse.com/1231993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-47684"
},
{
"cve": "CVE-2024-47706",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47706"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: fix possible UAF for bfqq-\u003ebic with merge chain\n\n1) initial state, three tasks:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t\t | ^ | ^\t\t | ^\n\t\t | | | |\t\t | |\n\t\t V | V |\t\t V |\n\t\t bfqq1 bfqq2\t\t bfqq3\nprocess ref:\t 1\t\t 1\t\t 1\n\n2) bfqq1 merged to bfqq2:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t\t | |\t\t | ^\n\t\t \\--------------\\|\t\t | |\n\t\t V\t\t V |\n\t\t bfqq1---------\u003ebfqq2\t\t bfqq3\nprocess ref:\t 0\t\t 2\t\t 1\n\n3) bfqq2 merged to bfqq3:\n\n\t\tProcess 1 Process 2\tProcess 3\n\t\t (BIC1) (BIC2)\t\t (BIC3)\n\t here -\u003e ^ |\t\t |\n\t\t \\--------------\\ \\-------------\\|\n\t\t V\t\t V\n\t\t bfqq1---------\u003ebfqq2----------\u003ebfqq3\nprocess ref:\t 0\t\t 1\t\t 3\n\nIn this case, IO from Process 1 will get bfqq2 from BIC1 first, and then\nget bfqq3 through merge chain, and finially handle IO by bfqq3.\nHowerver, current code will think bfqq2 is owned by BIC1, like initial\nstate, and set bfqq2-\u003ebic to BIC1.\n\nbfq_insert_request\n-\u003e by Process 1\n bfqq = bfq_init_rq(rq)\n bfqq = bfq_get_bfqq_handle_split\n bfqq = bic_to_bfqq\n -\u003e get bfqq2 from BIC1\n bfqq-\u003eref++\n rq-\u003eelv.priv[0] = bic\n rq-\u003eelv.priv[1] = bfqq\n if (bfqq_process_refs(bfqq) == 1)\n bfqq-\u003ebic = bic\n -\u003e record BIC1 to bfqq2\n\n __bfq_insert_request\n new_bfqq = bfq_setup_cooperator\n -\u003e get bfqq3 from bfqq2-\u003enew_bfqq\n bfqq_request_freed(bfqq)\n new_bfqq-\u003eref++\n rq-\u003eelv.priv[1] = new_bfqq\n -\u003e handle IO by bfqq3\n\nFix the problem by checking bfqq is from merge chain fist. And this\nmight fix a following problem reported by our syzkaller(unreproducible):\n\n==================================================================\nBUG: KASAN: slab-use-after-free in bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]\nBUG: KASAN: slab-use-after-free in bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]\nBUG: KASAN: slab-use-after-free in bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889\nWrite of size 1 at addr ffff888123839eb8 by task kworker/0:1H/18595\n\nCPU: 0 PID: 18595 Comm: kworker/0:1H Tainted: G L 6.6.0-07439-gba2303cacfda #6\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\nWorkqueue: kblockd blk_mq_requeue_work\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:364 [inline]\n print_report+0x10d/0x610 mm/kasan/report.c:475\n kasan_report+0x8e/0xc0 mm/kasan/report.c:588\n bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]\n bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]\n bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889\n bfq_get_bfqq_handle_split+0x169/0x5d0 block/bfq-iosched.c:6757\n bfq_init_rq block/bfq-iosched.c:6876 [inline]\n bfq_insert_request block/bfq-iosched.c:6254 [inline]\n bfq_insert_requests+0x1112/0x5cf0 block/bfq-iosched.c:6304\n blk_mq_insert_request+0x290/0x8d0 block/blk-mq.c:2593\n blk_mq_requeue_work+0x6bc/0xa70 block/blk-mq.c:1502\n process_one_work kernel/workqueue.c:2627 [inline]\n process_scheduled_works+0x432/0x13f0 kernel/workqueue.c:2700\n worker_thread+0x6f2/0x1160 kernel/workqueue.c:2781\n kthread+0x33c/0x440 kernel/kthread.c:388\n ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:305\n \u003c/TASK\u003e\n\nAllocated by task 20776:\n kasan_save_stack+0x20/0x40 mm/kasan/common.c:45\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\n __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328\n kasan_slab_alloc include/linux/kasan.h:188 [inline]\n slab_post_alloc_hook mm/slab.h:763 [inline]\n slab_alloc_node mm/slub.c:3458 [inline]\n kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503\n ioc_create_icq block/blk-ioc.c:370 [inline]\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47706",
"url": "https://www.suse.com/security/cve/CVE-2024-47706"
},
{
"category": "external",
"summary": "SUSE Bug 1231942 for CVE-2024-47706",
"url": "https://bugzilla.suse.com/1231942"
},
{
"category": "external",
"summary": "SUSE Bug 1231943 for CVE-2024-47706",
"url": "https://bugzilla.suse.com/1231943"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-47706"
},
{
"cve": "CVE-2024-49860",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-49860"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: sysfs: validate return type of _STR method\n\nOnly buffer objects are valid return values of _STR.\n\nIf something else is returned description_show() will access invalid\nmemory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-49860",
"url": "https://www.suse.com/security/cve/CVE-2024-49860"
},
{
"category": "external",
"summary": "SUSE Bug 1231861 for CVE-2024-49860",
"url": "https://bugzilla.suse.com/1231861"
},
{
"category": "external",
"summary": "SUSE Bug 1231862 for CVE-2024-49860",
"url": "https://bugzilla.suse.com/1231862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-49860"
},
{
"cve": "CVE-2024-50115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory\n\nIgnore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits\n4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn\u0027t\nenforce 32-byte alignment of nCR3.\n\nIn the absolute worst case scenario, failure to ignore bits 4:0 can result\nin an out-of-bounds read, e.g. if the target page is at the end of a\nmemslot, and the VMM isn\u0027t using guard pages.\n\nPer the APM:\n\n The CR3 register points to the base address of the page-directory-pointer\n table. The page-directory-pointer table is aligned on a 32-byte boundary,\n with the low 5 address bits 4:0 assumed to be 0.\n\nAnd the SDM\u0027s much more explicit:\n\n 4:0 Ignored\n\nNote, KVM gets this right when loading PDPTRs, it\u0027s only the nSVM flow\nthat is broken.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50115",
"url": "https://www.suse.com/security/cve/CVE-2024-50115"
},
{
"category": "external",
"summary": "SUSE Bug 1225742 for CVE-2024-50115",
"url": "https://bugzilla.suse.com/1225742"
},
{
"category": "external",
"summary": "SUSE Bug 1232919 for CVE-2024-50115",
"url": "https://bugzilla.suse.com/1232919"
},
{
"category": "external",
"summary": "SUSE Bug 1233019 for CVE-2024-50115",
"url": "https://bugzilla.suse.com/1233019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-50115"
},
{
"cve": "CVE-2024-50125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: SCO: Fix UAF on sco_sock_timeout\n\nconn-\u003esk maybe have been unlinked/freed while waiting for sco_conn_lock\nso this checks if the conn-\u003esk is still valid by checking if it part of\nsco_sk_list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50125",
"url": "https://www.suse.com/security/cve/CVE-2024-50125"
},
{
"category": "external",
"summary": "SUSE Bug 1232928 for CVE-2024-50125",
"url": "https://bugzilla.suse.com/1232928"
},
{
"category": "external",
"summary": "SUSE Bug 1232929 for CVE-2024-50125",
"url": "https://bugzilla.suse.com/1232929"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-50125"
},
{
"cve": "CVE-2024-50154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp/dccp: Don\u0027t use timer_pending() in reqsk_queue_unlink().\n\nMartin KaFai Lau reported use-after-free [0] in reqsk_timer_handler().\n\n \"\"\"\n We are seeing a use-after-free from a bpf prog attached to\n trace_tcp_retransmit_synack. The program passes the req-\u003esk to the\n bpf_sk_storage_get_tracing kernel helper which does check for null\n before using it.\n \"\"\"\n\nThe commit 83fccfc3940c (\"inet: fix potential deadlock in\nreqsk_queue_unlink()\") added timer_pending() in reqsk_queue_unlink() not\nto call del_timer_sync() from reqsk_timer_handler(), but it introduced a\nsmall race window.\n\nBefore the timer is called, expire_timers() calls detach_timer(timer, true)\nto clear timer-\u003eentry.pprev and marks it as not pending.\n\nIf reqsk_queue_unlink() checks timer_pending() just after expire_timers()\ncalls detach_timer(), TCP will miss del_timer_sync(); the reqsk timer will\ncontinue running and send multiple SYN+ACKs until it expires.\n\nThe reported UAF could happen if req-\u003esk is close()d earlier than the timer\nexpiration, which is 63s by default.\n\nThe scenario would be\n\n 1. inet_csk_complete_hashdance() calls inet_csk_reqsk_queue_drop(),\n but del_timer_sync() is missed\n\n 2. reqsk timer is executed and scheduled again\n\n 3. req-\u003esk is accept()ed and reqsk_put() decrements rsk_refcnt, but\n reqsk timer still has another one, and inet_csk_accept() does not\n clear req-\u003esk for non-TFO sockets\n\n 4. sk is close()d\n\n 5. reqsk timer is executed again, and BPF touches req-\u003esk\n\nLet\u0027s not use timer_pending() by passing the caller context to\n__inet_csk_reqsk_queue_drop().\n\nNote that reqsk timer is pinned, so the issue does not happen in most\nuse cases. [1]\n\n[0]\nBUG: KFENCE: use-after-free read in bpf_sk_storage_get_tracing+0x2e/0x1b0\n\nUse-after-free read at 0x00000000a891fb3a (in kfence-#1):\nbpf_sk_storage_get_tracing+0x2e/0x1b0\nbpf_prog_5ea3e95db6da0438_tcp_retransmit_synack+0x1d20/0x1dda\nbpf_trace_run2+0x4c/0xc0\ntcp_rtx_synack+0xf9/0x100\nreqsk_timer_handler+0xda/0x3d0\nrun_timer_softirq+0x292/0x8a0\nirq_exit_rcu+0xf5/0x320\nsysvec_apic_timer_interrupt+0x6d/0x80\nasm_sysvec_apic_timer_interrupt+0x16/0x20\nintel_idle_irq+0x5a/0xa0\ncpuidle_enter_state+0x94/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb\n\nkfence-#1: 0x00000000a72cc7b6-0x00000000d97616d9, size=2376, cache=TCPv6\n\nallocated by task 0 on cpu 9 at 260507.901592s:\nsk_prot_alloc+0x35/0x140\nsk_clone_lock+0x1f/0x3f0\ninet_csk_clone_lock+0x15/0x160\ntcp_create_openreq_child+0x1f/0x410\ntcp_v6_syn_recv_sock+0x1da/0x700\ntcp_check_req+0x1fb/0x510\ntcp_v6_rcv+0x98b/0x1420\nipv6_list_rcv+0x2258/0x26e0\nnapi_complete_done+0x5b1/0x2990\nmlx5e_napi_poll+0x2ae/0x8d0\nnet_rx_action+0x13e/0x590\nirq_exit_rcu+0xf5/0x320\ncommon_interrupt+0x80/0x90\nasm_common_interrupt+0x22/0x40\ncpuidle_enter_state+0xfb/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb\n\nfreed by task 0 on cpu 9 at 260507.927527s:\nrcu_core_si+0x4ff/0xf10\nirq_exit_rcu+0xf5/0x320\nsysvec_apic_timer_interrupt+0x6d/0x80\nasm_sysvec_apic_timer_interrupt+0x16/0x20\ncpuidle_enter_state+0xfb/0x273\ncpu_startup_entry+0x15e/0x260\nstart_secondary+0x8a/0x90\nsecondary_startup_64_no_verify+0xfa/0xfb",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50154",
"url": "https://www.suse.com/security/cve/CVE-2024-50154"
},
{
"category": "external",
"summary": "SUSE Bug 1233070 for CVE-2024-50154",
"url": "https://bugzilla.suse.com/1233070"
},
{
"category": "external",
"summary": "SUSE Bug 1233072 for CVE-2024-50154",
"url": "https://bugzilla.suse.com/1233072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-50154"
},
{
"cve": "CVE-2024-50264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50264"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: Initialization of the dangling pointer occurring in vsk-\u003etrans\n\nDuring loopback communication, a dangling pointer can be created in\nvsk-\u003etrans, potentially leading to a Use-After-Free condition. This\nissue is resolved by initializing vsk-\u003etrans to NULL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50264",
"url": "https://www.suse.com/security/cve/CVE-2024-50264"
},
{
"category": "external",
"summary": "SUSE Bug 1233453 for CVE-2024-50264",
"url": "https://bugzilla.suse.com/1233453"
},
{
"category": "external",
"summary": "SUSE Bug 1233712 for CVE-2024-50264",
"url": "https://bugzilla.suse.com/1233712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-50264"
},
{
"cve": "CVE-2024-50279",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50279"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm cache: fix out-of-bounds access to the dirty bitset when resizing\n\ndm-cache checks the dirty bits of the cache blocks to be dropped when\nshrinking the fast device, but an index bug in bitset iteration causes\nout-of-bounds access.\n\nReproduce steps:\n\n1. create a cache device of 1024 cache blocks (128 bytes dirty bitset)\n\ndmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\"\ndmsetup create cdata --table \"0 131072 linear /dev/sdc 8192\"\ndmsetup create corig --table \"0 524288 linear /dev/sdc 262144\"\ndd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct\ndmsetup create cache --table \"0 524288 cache /dev/mapper/cmeta \\\n/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\"\n\n2. shrink the fast device to 512 cache blocks, triggering out-of-bounds\n access to the dirty bitset (offset 0x80)\n\ndmsetup suspend cache\ndmsetup reload cdata --table \"0 65536 linear /dev/sdc 8192\"\ndmsetup resume cdata\ndmsetup resume cache\n\nKASAN reports:\n\n BUG: KASAN: vmalloc-out-of-bounds in cache_preresume+0x269/0x7b0\n Read of size 8 at addr ffffc900000f3080 by task dmsetup/131\n\n (...snip...)\n The buggy address belongs to the virtual mapping at\n [ffffc900000f3000, ffffc900000f5000) created by:\n cache_ctr+0x176a/0x35f0\n\n (...snip...)\n Memory state around the buggy address:\n ffffc900000f2f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n ffffc900000f3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n \u003effffc900000f3080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n ^\n ffffc900000f3100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n ffffc900000f3180: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n\nFix by making the index post-incremented.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50279",
"url": "https://www.suse.com/security/cve/CVE-2024-50279"
},
{
"category": "external",
"summary": "SUSE Bug 1233468 for CVE-2024-50279",
"url": "https://bugzilla.suse.com/1233468"
},
{
"category": "external",
"summary": "SUSE Bug 1233708 for CVE-2024-50279",
"url": "https://bugzilla.suse.com/1233708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-50279"
},
{
"cve": "CVE-2024-50301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50301"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsecurity/keys: fix slab-out-of-bounds in key_task_permission\n\nKASAN reports an out of bounds read:\nBUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36\nBUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline]\nBUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410\nsecurity/keys/permission.c:54\nRead of size 4 at addr ffff88813c3ab618 by task stress-ng/4362\n\nCPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15\nCall Trace:\n __dump_stack lib/dump_stack.c:82 [inline]\n dump_stack+0x107/0x167 lib/dump_stack.c:123\n print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400\n __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560\n kasan_report+0x3a/0x50 mm/kasan/report.c:585\n __kuid_val include/linux/uidgid.h:36 [inline]\n uid_eq include/linux/uidgid.h:63 [inline]\n key_task_permission+0x394/0x410 security/keys/permission.c:54\n search_nested_keyrings+0x90e/0xe90 security/keys/keyring.c:793\n\nThis issue was also reported by syzbot.\n\nIt can be reproduced by following these steps(more details [1]):\n1. Obtain more than 32 inputs that have similar hashes, which ends with the\n pattern \u00270xxxxxxxe6\u0027.\n2. Reboot and add the keys obtained in step 1.\n\nThe reproducer demonstrates how this issue happened:\n1. In the search_nested_keyrings function, when it iterates through the\n slots in a node(below tag ascend_to_node), if the slot pointer is meta\n and node-\u003eback_pointer != NULL(it means a root), it will proceed to\n descend_to_node. However, there is an exception. If node is the root,\n and one of the slots points to a shortcut, it will be treated as a\n keyring.\n2. Whether the ptr is keyring decided by keyring_ptr_is_keyring function.\n However, KEYRING_PTR_SUBTYPE is 0x2UL, the same as\n ASSOC_ARRAY_PTR_SUBTYPE_MASK.\n3. When 32 keys with the similar hashes are added to the tree, the ROOT\n has keys with hashes that are not similar (e.g. slot 0) and it splits\n NODE A without using a shortcut. When NODE A is filled with keys that\n all hashes are xxe6, the keys are similar, NODE A will split with a\n shortcut. Finally, it forms the tree as shown below, where slot 6 points\n to a shortcut.\n\n NODE A\n +------\u003e+---+\n ROOT | | 0 | xxe6\n +---+ | +---+\n xxxx | 0 | shortcut : : xxe6\n +---+ | +---+\n xxe6 : : | | | xxe6\n +---+ | +---+\n | 6 |---+ : : xxe6\n +---+ +---+\n xxe6 : : | f | xxe6\n +---+ +---+\n xxe6 | f |\n +---+\n\n4. As mentioned above, If a slot(slot 6) of the root points to a shortcut,\n it may be mistakenly transferred to a key*, leading to a read\n out-of-bounds read.\n\nTo fix this issue, one should jump to descend_to_node if the ptr is a\nshortcut, regardless of whether the node is root or not.\n\n[1] https://lore.kernel.org/linux-kernel/1cfa878e-8c7b-4570-8606-21daf5e13ce7@huaweicloud.com/\n\n[jarkko: tweaked the commit message a bit to have an appropriate closes\n tag.]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50301",
"url": "https://www.suse.com/security/cve/CVE-2024-50301"
},
{
"category": "external",
"summary": "SUSE Bug 1233490 for CVE-2024-50301",
"url": "https://bugzilla.suse.com/1233490"
},
{
"category": "external",
"summary": "SUSE Bug 1233680 for CVE-2024-50301",
"url": "https://bugzilla.suse.com/1233680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-50301"
},
{
"cve": "CVE-2024-50302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-50302"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: zero-initialize the report buffer\n\nSince the report buffer is used by all kinds of drivers in various ways, let\u0027s\nzero-initialize it during allocation to make sure that it can\u0027t be ever used\nto leak kernel memory via specially-crafted report.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-50302",
"url": "https://www.suse.com/security/cve/CVE-2024-50302"
},
{
"category": "external",
"summary": "SUSE Bug 1233491 for CVE-2024-50302",
"url": "https://bugzilla.suse.com/1233491"
},
{
"category": "external",
"summary": "SUSE Bug 1233679 for CVE-2024-50302",
"url": "https://bugzilla.suse.com/1233679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-50302"
},
{
"cve": "CVE-2024-53104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format\n\nThis can lead to out of bounds writes since frames of this type were not\ntaken into account when calculating the size of the frames buffer in\nuvc_parse_streaming.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53104",
"url": "https://www.suse.com/security/cve/CVE-2024-53104"
},
{
"category": "external",
"summary": "SUSE Bug 1234025 for CVE-2024-53104",
"url": "https://bugzilla.suse.com/1234025"
},
{
"category": "external",
"summary": "SUSE Bug 1236783 for CVE-2024-53104",
"url": "https://bugzilla.suse.com/1236783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-53104"
},
{
"cve": "CVE-2024-53146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Prevent a potential integer overflow\n\nIf the tag length is \u003e= U32_MAX - 3 then the \"length + 4\" addition\ncan result in an integer overflow. Address this by splitting the\ndecoding into several steps so that decode_cb_compound4res() does\nnot have to perform arithmetic on the unsafe length value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53146",
"url": "https://www.suse.com/security/cve/CVE-2024-53146"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234854 for CVE-2024-53146",
"url": "https://bugzilla.suse.com/1234854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-53146"
},
{
"cve": "CVE-2024-53156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()\n\nI found the following bug in my fuzzer:\n\n UBSAN: array-index-out-of-bounds in drivers/net/wireless/ath/ath9k/htc_hst.c:26:51\n index 255 is out of range for type \u0027htc_endpoint [22]\u0027\n CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc6-dirty #14\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n Workqueue: events request_firmware_work_func\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x180/0x1b0\n __ubsan_handle_out_of_bounds+0xd4/0x130\n htc_issue_send.constprop.0+0x20c/0x230\n ? _raw_spin_unlock_irqrestore+0x3c/0x70\n ath9k_wmi_cmd+0x41d/0x610\n ? mark_held_locks+0x9f/0xe0\n ...\n\nSince this bug has been confirmed to be caused by insufficient verification\nof conn_rsp_epid, I think it would be appropriate to add a range check for\nconn_rsp_epid to htc_connect_service() to prevent the bug from occurring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53156",
"url": "https://www.suse.com/security/cve/CVE-2024-53156"
},
{
"category": "external",
"summary": "SUSE Bug 1234846 for CVE-2024-53156",
"url": "https://bugzilla.suse.com/1234846"
},
{
"category": "external",
"summary": "SUSE Bug 1234847 for CVE-2024-53156",
"url": "https://bugzilla.suse.com/1234847"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53156",
"url": "https://bugzilla.suse.com/1234853"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-53156"
},
{
"cve": "CVE-2024-53168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix one UAF issue caused by sunrpc kernel tcp socket\n\nBUG: KASAN: slab-use-after-free in tcp_write_timer_handler+0x156/0x3e0\nRead of size 1 at addr ffff888111f322cd by task swapper/0/0\n\nCPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc4-dirty #7\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x68/0xa0\n print_address_description.constprop.0+0x2c/0x3d0\n print_report+0xb4/0x270\n kasan_report+0xbd/0xf0\n tcp_write_timer_handler+0x156/0x3e0\n tcp_write_timer+0x66/0x170\n call_timer_fn+0xfb/0x1d0\n __run_timers+0x3f8/0x480\n run_timer_softirq+0x9b/0x100\n handle_softirqs+0x153/0x390\n __irq_exit_rcu+0x103/0x120\n irq_exit_rcu+0xe/0x20\n sysvec_apic_timer_interrupt+0x76/0x90\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n asm_sysvec_apic_timer_interrupt+0x1a/0x20\nRIP: 0010:default_idle+0xf/0x20\nCode: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90\n 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 33 f8 25 00 fb f4 \u003cfa\u003e c3 cc cc cc\n cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90\nRSP: 0018:ffffffffa2007e28 EFLAGS: 00000242\nRAX: 00000000000f3b31 RBX: 1ffffffff4400fc7 RCX: ffffffffa09c3196\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff9f00590f\nRBP: 0000000000000000 R08: 0000000000000001 R09: ffffed102360835d\nR10: ffff88811b041aeb R11: 0000000000000001 R12: 0000000000000000\nR13: ffffffffa202d7c0 R14: 0000000000000000 R15: 00000000000147d0\n default_idle_call+0x6b/0xa0\n cpuidle_idle_call+0x1af/0x1f0\n do_idle+0xbc/0x130\n cpu_startup_entry+0x33/0x40\n rest_init+0x11f/0x210\n start_kernel+0x39a/0x420\n x86_64_start_reservations+0x18/0x30\n x86_64_start_kernel+0x97/0xa0\n common_startup_64+0x13e/0x141\n \u003c/TASK\u003e\n\nAllocated by task 595:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_slab_alloc+0x87/0x90\n kmem_cache_alloc_noprof+0x12b/0x3f0\n copy_net_ns+0x94/0x380\n create_new_namespaces+0x24c/0x500\n unshare_nsproxy_namespaces+0x75/0xf0\n ksys_unshare+0x24e/0x4f0\n __x64_sys_unshare+0x1f/0x30\n do_syscall_64+0x70/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 100:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3b/0x60\n __kasan_slab_free+0x54/0x70\n kmem_cache_free+0x156/0x5d0\n cleanup_net+0x5d3/0x670\n process_one_work+0x776/0xa90\n worker_thread+0x2e2/0x560\n kthread+0x1a8/0x1f0\n ret_from_fork+0x34/0x60\n ret_from_fork_asm+0x1a/0x30\n\nReproduction script:\n\nmkdir -p /mnt/nfsshare\nmkdir -p /mnt/nfs/netns_1\nmkfs.ext4 /dev/sdb\nmount /dev/sdb /mnt/nfsshare\nsystemctl restart nfs-server\nchmod 777 /mnt/nfsshare\nexportfs -i -o rw,no_root_squash *:/mnt/nfsshare\n\nip netns add netns_1\nip link add name veth_1_peer type veth peer veth_1\nifconfig veth_1_peer 11.11.0.254 up\nip link set veth_1 netns netns_1\nip netns exec netns_1 ifconfig veth_1 11.11.0.1\n\nip netns exec netns_1 /root/iptables -A OUTPUT -d 11.11.0.254 -p tcp \\\n\t--tcp-flags FIN FIN -j DROP\n\n(note: In my environment, a DESTROY_CLIENTID operation is always sent\n immediately, breaking the nfs tcp connection.)\nip netns exec netns_1 timeout -s 9 300 mount -t nfs -o proto=tcp,vers=4.1 \\\n\t11.11.0.254:/mnt/nfsshare /mnt/nfs/netns_1\n\nip netns del netns_1\n\nThe reason here is that the tcp socket in netns_1 (nfs side) has been\nshutdown and closed (done in xs_destroy), but the FIN message (with ack)\nis discarded, and the nfsd side keeps sending retransmission messages.\nAs a result, when the tcp sock in netns_1 processes the received message,\nit sends the message (FIN message) in the sending queue, and the tcp timer\nis re-established. When the network namespace is deleted, the net structure\naccessed by tcp\u0027s timer handler function causes problems.\n\nTo fix this problem, let\u0027s hold netns refcnt for the tcp kernel socket as\ndone in other modules. This is an ugly hack which can easily be backported\nto earlier kernels. A proper fix which cleans up the interfaces will\nfollow, but may not be so easy to backport.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53168",
"url": "https://www.suse.com/security/cve/CVE-2024-53168"
},
{
"category": "external",
"summary": "SUSE Bug 1234887 for CVE-2024-53168",
"url": "https://bugzilla.suse.com/1234887"
},
{
"category": "external",
"summary": "SUSE Bug 1243650 for CVE-2024-53168",
"url": "https://bugzilla.suse.com/1243650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-53168"
},
{
"cve": "CVE-2024-53173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53173",
"url": "https://www.suse.com/security/cve/CVE-2024-53173"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1234891 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234891"
},
{
"category": "external",
"summary": "SUSE Bug 1234892 for CVE-2024-53173",
"url": "https://bugzilla.suse.com/1234892"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-53173"
},
{
"cve": "CVE-2024-53214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-53214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Properly hide first-in-list PCIe extended capability\n\nThere are cases where a PCIe extended capability should be hidden from\nthe user. For example, an unknown capability (i.e., capability with ID\ngreater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally\nchosen to be hidden from the user.\n\nHiding a capability is done by virtualizing and modifying the \u0027Next\nCapability Offset\u0027 field of the previous capability so it points to the\ncapability after the one that should be hidden.\n\nThe special case where the first capability in the list should be hidden\nis handled differently because there is no previous capability that can\nbe modified. In this case, the capability ID and version are zeroed\nwhile leaving the next pointer intact. This hides the capability and\nleaves an anchor for the rest of the capability list.\n\nHowever, today, hiding the first capability in the list is not done\nproperly if the capability is unknown, as struct\nvfio_pci_core_device-\u003epci_config_map is set to the capability ID during\ninitialization but the capability ID is not properly checked later when\nused in vfio_config_do_rw(). This leads to the following warning [1] and\nto an out-of-bounds access to ecap_perms array.\n\nFix it by checking cap_id in vfio_config_do_rw(), and if it is greater\nthan PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct\nread only access instead of the ecap_perms array.\n\nNote that this is safe since the above is the only case where cap_id can\nexceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which\nare already checked before).\n\n[1]\n\nWARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\nCPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1\n(snip)\nCall Trace:\n \u003cTASK\u003e\n ? show_regs+0x69/0x80\n ? __warn+0x8d/0x140\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? report_bug+0x18f/0x1a0\n ? handle_bug+0x63/0xa0\n ? exc_invalid_op+0x19/0x70\n ? asm_exc_invalid_op+0x1b/0x20\n ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]\n ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]\n vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]\n vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]\n vfio_device_fops_read+0x27/0x40 [vfio]\n vfs_read+0xbd/0x340\n ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]\n ? __rseq_handle_notify_resume+0xa4/0x4b0\n __x64_sys_pread64+0x96/0xc0\n x64_sys_call+0x1c3d/0x20d0\n do_syscall_64+0x4d/0x120\n entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-53214",
"url": "https://www.suse.com/security/cve/CVE-2024-53214"
},
{
"category": "external",
"summary": "SUSE Bug 1235004 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235004"
},
{
"category": "external",
"summary": "SUSE Bug 1235005 for CVE-2024-53214",
"url": "https://bugzilla.suse.com/1235005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-53214"
},
{
"cve": "CVE-2024-56600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56600"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: inet6: do not leave a dangling sk pointer in inet6_create()\n\nsock_init_data() attaches the allocated sk pointer to the provided sock\nobject. If inet6_create() fails later, the sk object is released, but the\nsock object retains the dangling sk pointer, which may cause use-after-free\nlater.\n\nClear the sock sk pointer on error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56600",
"url": "https://www.suse.com/security/cve/CVE-2024-56600"
},
{
"category": "external",
"summary": "SUSE Bug 1235217 for CVE-2024-56600",
"url": "https://bugzilla.suse.com/1235217"
},
{
"category": "external",
"summary": "SUSE Bug 1235218 for CVE-2024-56600",
"url": "https://bugzilla.suse.com/1235218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-56600"
},
{
"cve": "CVE-2024-56601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56601"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: inet: do not leave a dangling sk pointer in inet_create()\n\nsock_init_data() attaches the allocated sk object to the provided sock\nobject. If inet_create() fails later, the sk object is freed, but the\nsock object retains the dangling pointer, which may create use-after-free\nlater.\n\nClear the sk pointer in the sock object on error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56601",
"url": "https://www.suse.com/security/cve/CVE-2024-56601"
},
{
"category": "external",
"summary": "SUSE Bug 1235230 for CVE-2024-56601",
"url": "https://bugzilla.suse.com/1235230"
},
{
"category": "external",
"summary": "SUSE Bug 1235231 for CVE-2024-56601",
"url": "https://bugzilla.suse.com/1235231"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-56601"
},
{
"cve": "CVE-2024-56605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56605"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()\n\nbt_sock_alloc() allocates the sk object and attaches it to the provided\nsock object. On error l2cap_sock_alloc() frees the sk object, but the\ndangling pointer is still attached to the sock object, which may create\nuse-after-free in other code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56605",
"url": "https://www.suse.com/security/cve/CVE-2024-56605"
},
{
"category": "external",
"summary": "SUSE Bug 1234853 for CVE-2024-56605",
"url": "https://bugzilla.suse.com/1234853"
},
{
"category": "external",
"summary": "SUSE Bug 1235061 for CVE-2024-56605",
"url": "https://bugzilla.suse.com/1235061"
},
{
"category": "external",
"summary": "SUSE Bug 1235062 for CVE-2024-56605",
"url": "https://bugzilla.suse.com/1235062"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-56605"
},
{
"cve": "CVE-2024-56650",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56650"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: x_tables: fix LED ID check in led_tg_check()\n\nSyzbot has reported the following BUG detected by KASAN:\n\nBUG: KASAN: slab-out-of-bounds in strlen+0x58/0x70\nRead of size 1 at addr ffff8881022da0c8 by task repro/5879\n...\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x241/0x360\n ? __pfx_dump_stack_lvl+0x10/0x10\n ? __pfx__printk+0x10/0x10\n ? _printk+0xd5/0x120\n ? __virt_addr_valid+0x183/0x530\n ? __virt_addr_valid+0x183/0x530\n print_report+0x169/0x550\n ? __virt_addr_valid+0x183/0x530\n ? __virt_addr_valid+0x183/0x530\n ? __virt_addr_valid+0x45f/0x530\n ? __phys_addr+0xba/0x170\n ? strlen+0x58/0x70\n kasan_report+0x143/0x180\n ? strlen+0x58/0x70\n strlen+0x58/0x70\n kstrdup+0x20/0x80\n led_tg_check+0x18b/0x3c0\n xt_check_target+0x3bb/0xa40\n ? __pfx_xt_check_target+0x10/0x10\n ? stack_depot_save_flags+0x6e4/0x830\n ? nft_target_init+0x174/0xc30\n nft_target_init+0x82d/0xc30\n ? __pfx_nft_target_init+0x10/0x10\n ? nf_tables_newrule+0x1609/0x2980\n ? nf_tables_newrule+0x1609/0x2980\n ? rcu_is_watching+0x15/0xb0\n ? nf_tables_newrule+0x1609/0x2980\n ? nf_tables_newrule+0x1609/0x2980\n ? __kmalloc_noprof+0x21a/0x400\n nf_tables_newrule+0x1860/0x2980\n ? __pfx_nf_tables_newrule+0x10/0x10\n ? __nla_parse+0x40/0x60\n nfnetlink_rcv+0x14e5/0x2ab0\n ? __pfx_validate_chain+0x10/0x10\n ? __pfx_nfnetlink_rcv+0x10/0x10\n ? __lock_acquire+0x1384/0x2050\n ? netlink_deliver_tap+0x2e/0x1b0\n ? __pfx_lock_release+0x10/0x10\n ? netlink_deliver_tap+0x2e/0x1b0\n netlink_unicast+0x7f8/0x990\n ? __pfx_netlink_unicast+0x10/0x10\n ? __virt_addr_valid+0x183/0x530\n ? __check_object_size+0x48e/0x900\n netlink_sendmsg+0x8e4/0xcb0\n ? __pfx_netlink_sendmsg+0x10/0x10\n ? aa_sock_msg_perm+0x91/0x160\n ? __pfx_netlink_sendmsg+0x10/0x10\n __sock_sendmsg+0x223/0x270\n ____sys_sendmsg+0x52a/0x7e0\n ? __pfx_____sys_sendmsg+0x10/0x10\n __sys_sendmsg+0x292/0x380\n ? __pfx___sys_sendmsg+0x10/0x10\n ? lockdep_hardirqs_on_prepare+0x43d/0x780\n ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10\n ? exc_page_fault+0x590/0x8c0\n ? do_syscall_64+0xb6/0x230\n do_syscall_64+0xf3/0x230\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n \u003c/TASK\u003e\n\nSince an invalid (without \u0027\\0\u0027 byte at all) byte sequence may be passed\nfrom userspace, add an extra check to ensure that such a sequence is\nrejected as possible ID and so never passed to \u0027kstrdup()\u0027 and further.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56650",
"url": "https://www.suse.com/security/cve/CVE-2024-56650"
},
{
"category": "external",
"summary": "SUSE Bug 1235430 for CVE-2024-56650",
"url": "https://bugzilla.suse.com/1235430"
},
{
"category": "external",
"summary": "SUSE Bug 1235431 for CVE-2024-56650",
"url": "https://bugzilla.suse.com/1235431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-56650"
},
{
"cve": "CVE-2024-56664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56664"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix race between element replace and close()\n\nElement replace (with a socket different from the one stored) may race\nwith socket\u0027s close() link popping \u0026 unlinking. __sock_map_delete()\nunconditionally unrefs the (wrong) element:\n\n// set map[0] = s0\nmap_update_elem(map, 0, s0)\n\n// drop fd of s0\nclose(s0)\n sock_map_close()\n lock_sock(sk) (s0!)\n sock_map_remove_links(sk)\n link = sk_psock_link_pop()\n sock_map_unlink(sk, link)\n sock_map_delete_from_link\n // replace map[0] with s1\n map_update_elem(map, 0, s1)\n sock_map_update_elem\n (s1!) lock_sock(sk)\n sock_map_update_common\n psock = sk_psock(sk)\n spin_lock(\u0026stab-\u003elock)\n osk = stab-\u003esks[idx]\n sock_map_add_link(..., \u0026stab-\u003esks[idx])\n sock_map_unref(osk, \u0026stab-\u003esks[idx])\n psock = sk_psock(osk)\n sk_psock_put(sk, psock)\n if (refcount_dec_and_test(\u0026psock))\n sk_psock_drop(sk, psock)\n spin_unlock(\u0026stab-\u003elock)\n unlock_sock(sk)\n __sock_map_delete\n spin_lock(\u0026stab-\u003elock)\n sk = *psk // s1 replaced s0; sk == s1\n if (!sk_test || sk_test == sk) // sk_test (s0) != sk (s1); no branch\n sk = xchg(psk, NULL)\n if (sk)\n sock_map_unref(sk, psk) // unref s1; sks[idx] will dangle\n psock = sk_psock(sk)\n sk_psock_put(sk, psock)\n if (refcount_dec_and_test())\n sk_psock_drop(sk, psock)\n spin_unlock(\u0026stab-\u003elock)\n release_sock(sk)\n\nThen close(map) enqueues bpf_map_free_deferred, which finally calls\nsock_map_free(). This results in some refcount_t warnings along with\na KASAN splat [1].\n\nFix __sock_map_delete(), do not allow sock_map_unref() on elements that\nmay have been replaced.\n\n[1]:\nBUG: KASAN: slab-use-after-free in sock_map_free+0x10e/0x330\nWrite of size 4 at addr ffff88811f5b9100 by task kworker/u64:12/1063\n\nCPU: 14 UID: 0 PID: 1063 Comm: kworker/u64:12 Not tainted 6.12.0+ #125\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014\nWorkqueue: events_unbound bpf_map_free_deferred\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x68/0x90\n print_report+0x174/0x4f6\n kasan_report+0xb9/0x190\n kasan_check_range+0x10f/0x1e0\n sock_map_free+0x10e/0x330\n bpf_map_free_deferred+0x173/0x320\n process_one_work+0x846/0x1420\n worker_thread+0x5b3/0xf80\n kthread+0x29e/0x360\n ret_from_fork+0x2d/0x70\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\n\nAllocated by task 1202:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n __kasan_slab_alloc+0x85/0x90\n kmem_cache_alloc_noprof+0x131/0x450\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x2c/0x870\n unix_create1+0x88/0x8a0\n unix_create+0xc5/0x180\n __sock_create+0x241/0x650\n __sys_socketpair+0x1ce/0x420\n __x64_sys_socketpair+0x92/0x100\n do_syscall_64+0x93/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFreed by task 46:\n kasan_save_stack+0x1e/0x40\n kasan_save_track+0x10/0x30\n kasan_save_free_info+0x37/0x60\n __kasan_slab_free+0x4b/0x70\n kmem_cache_free+0x1a1/0x590\n __sk_destruct+0x388/0x5a0\n sk_psock_destroy+0x73e/0xa50\n process_one_work+0x846/0x1420\n worker_thread+0x5b3/0xf80\n kthread+0x29e/0x360\n ret_from_fork+0x2d/0x70\n ret_from_fork_asm+0x1a/0x30\n\nThe bu\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56664",
"url": "https://www.suse.com/security/cve/CVE-2024-56664"
},
{
"category": "external",
"summary": "SUSE Bug 1235249 for CVE-2024-56664",
"url": "https://bugzilla.suse.com/1235249"
},
{
"category": "external",
"summary": "SUSE Bug 1235250 for CVE-2024-56664",
"url": "https://bugzilla.suse.com/1235250"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-56664"
},
{
"cve": "CVE-2024-57893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57893"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: seq: oss: Fix races at processing SysEx messages\n\nOSS sequencer handles the SysEx messages split in 6 bytes packets, and\nALSA sequencer OSS layer tries to combine those. It stores the data\nin the internal buffer and this access is racy as of now, which may\nlead to the out-of-bounds access.\n\nAs a temporary band-aid fix, introduce a mutex for serializing the\nprocess of the SysEx message packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57893",
"url": "https://www.suse.com/security/cve/CVE-2024-57893"
},
{
"category": "external",
"summary": "SUSE Bug 1235920 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235920"
},
{
"category": "external",
"summary": "SUSE Bug 1235921 for CVE-2024-57893",
"url": "https://bugzilla.suse.com/1235921"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-57893"
},
{
"cve": "CVE-2024-57996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-57996"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: don\u0027t allow 1 packet limit\n\nThe current implementation does not work correctly with a limit of\n1. iproute2 actually checks for this and this patch adds the check in\nkernel as well.\n\nThis fixes the following syzkaller reported crash:\n\nUBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6\nindex 65535 is out of range for type \u0027struct sfq_head[128]\u0027\nCPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nCall Trace:\n __dump_stack lib/dump_stack.c:79 [inline]\n dump_stack+0x125/0x19f lib/dump_stack.c:120\n ubsan_epilogue lib/ubsan.c:148 [inline]\n __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347\n sfq_link net/sched/sch_sfq.c:210 [inline]\n sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238\n sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500\n sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525\n qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026\n tbf_reset+0x3d/0x100 net/sched/sch_tbf.c:319\n qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026\n dev_reset_queue+0x8c/0x140 net/sched/sch_generic.c:1296\n netdev_for_each_tx_queue include/linux/netdevice.h:2350 [inline]\n dev_deactivate_many+0x6dc/0xc20 net/sched/sch_generic.c:1362\n __dev_close_many+0x214/0x350 net/core/dev.c:1468\n dev_close_many+0x207/0x510 net/core/dev.c:1506\n unregister_netdevice_many+0x40f/0x16b0 net/core/dev.c:10738\n unregister_netdevice_queue+0x2be/0x310 net/core/dev.c:10695\n unregister_netdevice include/linux/netdevice.h:2893 [inline]\n __tun_detach+0x6b6/0x1600 drivers/net/tun.c:689\n tun_detach drivers/net/tun.c:705 [inline]\n tun_chr_close+0x104/0x1b0 drivers/net/tun.c:3640\n __fput+0x203/0x840 fs/file_table.c:280\n task_work_run+0x129/0x1b0 kernel/task_work.c:185\n exit_task_work include/linux/task_work.h:33 [inline]\n do_exit+0x5ce/0x2200 kernel/exit.c:931\n do_group_exit+0x144/0x310 kernel/exit.c:1046\n __do_sys_exit_group kernel/exit.c:1057 [inline]\n __se_sys_exit_group kernel/exit.c:1055 [inline]\n __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1055\n do_syscall_64+0x6c/0xd0\n entry_SYSCALL_64_after_hwframe+0x61/0xcb\nRIP: 0033:0x7fe5e7b52479\nCode: Unable to access opcode bytes at RIP 0x7fe5e7b5244f.\nRSP: 002b:00007ffd3c800398 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe5e7b52479\nRDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000\nRBP: 00007fe5e7bcd2d0 R08: ffffffffffffffb8 R09: 0000000000000014\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e7bcd2d0\nR13: 0000000000000000 R14: 00007fe5e7bcdd20 R15: 00007fe5e7b24270\n\nThe crash can be also be reproduced with the following (with a tc\nrecompiled to allow for sfq limits of 1):\n\ntc qdisc add dev dummy0 handle 1: root tbf rate 1Kbit burst 100b lat 1s\n../iproute2-6.9.0/tc/tc qdisc add dev dummy0 handle 2: parent 1:10 sfq limit 1\nifconfig dummy0 up\nping -I dummy0 -f -c2 -W0.1 8.8.8.8\nsleep 1\n\nScenario that triggers the crash:\n\n* the first packet is sent and queued in TBF and SFQ; qdisc qlen is 1\n\n* TBF dequeues: it peeks from SFQ which moves the packet to the\n gso_skb list and keeps qdisc qlen set to 1. TBF is out of tokens so\n it schedules itself for later.\n\n* the second packet is sent and TBF tries to queues it to SFQ. qdisc\n qlen is now 2 and because the SFQ limit is 1 the packet is dropped\n by SFQ. At this point qlen is 1, and all of the SFQ slots are empty,\n however q-\u003etail is not NULL.\n\nAt this point, assuming no more packets are queued, when sch_dequeue\nruns again it will decrement the qlen for the current empty slot\ncausing an underflow and the subsequent out of bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-57996",
"url": "https://www.suse.com/security/cve/CVE-2024-57996"
},
{
"category": "external",
"summary": "SUSE Bug 1239076 for CVE-2024-57996",
"url": "https://bugzilla.suse.com/1239076"
},
{
"category": "external",
"summary": "SUSE Bug 1239077 for CVE-2024-57996",
"url": "https://bugzilla.suse.com/1239077"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-57996"
},
{
"cve": "CVE-2024-8805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-8805"
}
],
"notes": [
{
"category": "general",
"text": "BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25177.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-8805",
"url": "https://www.suse.com/security/cve/CVE-2024-8805"
},
{
"category": "external",
"summary": "SUSE Bug 1230697 for CVE-2024-8805",
"url": "https://bugzilla.suse.com/1230697"
},
{
"category": "external",
"summary": "SUSE Bug 1240804 for CVE-2024-8805",
"url": "https://bugzilla.suse.com/1240804"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2024-8805"
},
{
"cve": "CVE-2025-21702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21702"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npfifo_tail_enqueue: Drop new packet when sch-\u003elimit == 0\n\nExpected behaviour:\nIn case we reach scheduler\u0027s limit, pfifo_tail_enqueue() will drop a\npacket in scheduler\u0027s queue and decrease scheduler\u0027s qlen by one.\nThen, pfifo_tail_enqueue() enqueue new packet and increase\nscheduler\u0027s qlen by one. Finally, pfifo_tail_enqueue() return\n`NET_XMIT_CN` status code.\n\nWeird behaviour:\nIn case we set `sch-\u003elimit == 0` and trigger pfifo_tail_enqueue() on a\nscheduler that has no packet, the \u0027drop a packet\u0027 step will do nothing.\nThis means the scheduler\u0027s qlen still has value equal 0.\nThen, we continue to enqueue new packet and increase scheduler\u0027s qlen by\none. In summary, we can leverage pfifo_tail_enqueue() to increase qlen by\none and return `NET_XMIT_CN` status code.\n\nThe problem is:\nLet\u0027s say we have two qdiscs: Qdisc_A and Qdisc_B.\n - Qdisc_A\u0027s type must have \u0027-\u003egraft()\u0027 function to create parent/child relationship.\n Let\u0027s say Qdisc_A\u0027s type is `hfsc`. Enqueue packet to this qdisc will trigger `hfsc_enqueue`.\n - Qdisc_B\u0027s type is pfifo_head_drop. Enqueue packet to this qdisc will trigger `pfifo_tail_enqueue`.\n - Qdisc_B is configured to have `sch-\u003elimit == 0`.\n - Qdisc_A is configured to route the enqueued\u0027s packet to Qdisc_B.\n\nEnqueue packet through Qdisc_A will lead to:\n - hfsc_enqueue(Qdisc_A) -\u003e pfifo_tail_enqueue(Qdisc_B)\n - Qdisc_B-\u003eq.qlen += 1\n - pfifo_tail_enqueue() return `NET_XMIT_CN`\n - hfsc_enqueue() check for `NET_XMIT_SUCCESS` and see `NET_XMIT_CN` =\u003e hfsc_enqueue() don\u0027t increase qlen of Qdisc_A.\n\nThe whole process lead to a situation where Qdisc_A-\u003eq.qlen == 0 and Qdisc_B-\u003eq.qlen == 1.\nReplace \u0027hfsc\u0027 with other type (for example: \u0027drr\u0027) still lead to the same problem.\nThis violate the design where parent\u0027s qlen should equal to the sum of its childrens\u0027qlen.\n\nBug impact: This issue can be used for user-\u003ekernel privilege escalation when it is reachable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21702",
"url": "https://www.suse.com/security/cve/CVE-2025-21702"
},
{
"category": "external",
"summary": "SUSE Bug 1237312 for CVE-2025-21702",
"url": "https://bugzilla.suse.com/1237312"
},
{
"category": "external",
"summary": "SUSE Bug 1245797 for CVE-2025-21702",
"url": "https://bugzilla.suse.com/1245797"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-21702"
},
{
"cve": "CVE-2025-21772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21772"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npartitions: mac: fix handling of bogus partition table\n\nFix several issues in partition probing:\n\n - The bailout for a bad partoffset must use put_dev_sector(), since the\n preceding read_part_sector() succeeded.\n - If the partition table claims a silly sector size like 0xfff bytes\n (which results in partition table entries straddling sector boundaries),\n bail out instead of accessing out-of-bounds memory.\n - We must not assume that the partition table contains proper NUL\n termination - use strnlen() and strncmp() instead of strlen() and\n strcmp().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21772",
"url": "https://www.suse.com/security/cve/CVE-2025-21772"
},
{
"category": "external",
"summary": "SUSE Bug 1238911 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238911"
},
{
"category": "external",
"summary": "SUSE Bug 1238912 for CVE-2025-21772",
"url": "https://bugzilla.suse.com/1238912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-21772"
},
{
"cve": "CVE-2025-21791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21791"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvrf: use RCU protection in l3mdev_l3_out()\n\nl3mdev_l3_out() can be called without RCU being held:\n\nraw_sendmsg()\n ip_push_pending_frames()\n ip_send_skb()\n ip_local_out()\n __ip_local_out()\n l3mdev_ip_out()\n\nAdd rcu_read_lock() / rcu_read_unlock() pair to avoid\na potential UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21791",
"url": "https://www.suse.com/security/cve/CVE-2025-21791"
},
{
"category": "external",
"summary": "SUSE Bug 1238512 for CVE-2025-21791",
"url": "https://bugzilla.suse.com/1238512"
},
{
"category": "external",
"summary": "SUSE Bug 1240744 for CVE-2025-21791",
"url": "https://bugzilla.suse.com/1240744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-21791"
},
{
"cve": "CVE-2025-21971",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-21971"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: Prevent creation of classes with TC_H_ROOT\n\nThe function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination\ncondition when traversing up the qdisc tree to update parent backlog\ncounters. However, if a class is created with classid TC_H_ROOT, the\ntraversal terminates prematurely at this class instead of reaching the\nactual root qdisc, causing parent statistics to be incorrectly maintained.\nIn case of DRR, this could lead to a crash as reported by Mingi Cho.\n\nPrevent the creation of any Qdisc class with classid TC_H_ROOT\n(0xFFFFFFFF) across all qdisc types, as suggested by Jamal.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-21971",
"url": "https://www.suse.com/security/cve/CVE-2025-21971"
},
{
"category": "external",
"summary": "SUSE Bug 1240799 for CVE-2025-21971",
"url": "https://bugzilla.suse.com/1240799"
},
{
"category": "external",
"summary": "SUSE Bug 1245794 for CVE-2025-21971",
"url": "https://bugzilla.suse.com/1245794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-21971"
},
{
"cve": "CVE-2025-37752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: move the limit validation\n\nIt is not sufficient to directly validate the limit on the data that\nthe user passes as it can be updated based on how the other parameters\nare changed.\n\nMove the check at the end of the configuration update process to also\ncatch scenarios where the limit is indirectly updated, for example\nwith the following configurations:\n\ntc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1\ntc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1\n\nThis fixes the following syzkaller reported crash:\n\n------------[ cut here ]------------\nUBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6\nindex 65535 is out of range for type \u0027struct sfq_head[128]\u0027\nCPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x201/0x300 lib/dump_stack.c:120\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_out_of_bounds+0xf5/0x120 lib/ubsan.c:429\n sfq_link net/sched/sch_sfq.c:203 [inline]\n sfq_dec+0x53c/0x610 net/sched/sch_sfq.c:231\n sfq_dequeue+0x34e/0x8c0 net/sched/sch_sfq.c:493\n sfq_reset+0x17/0x60 net/sched/sch_sfq.c:518\n qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035\n tbf_reset+0x41/0x110 net/sched/sch_tbf.c:339\n qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035\n dev_reset_queue+0x100/0x1b0 net/sched/sch_generic.c:1311\n netdev_for_each_tx_queue include/linux/netdevice.h:2590 [inline]\n dev_deactivate_many+0x7e5/0xe70 net/sched/sch_generic.c:1375",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37752",
"url": "https://www.suse.com/security/cve/CVE-2025-37752"
},
{
"category": "external",
"summary": "SUSE Bug 1242504 for CVE-2025-37752",
"url": "https://bugzilla.suse.com/1242504"
},
{
"category": "external",
"summary": "SUSE Bug 1245776 for CVE-2025-37752",
"url": "https://bugzilla.suse.com/1245776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-37752"
},
{
"cve": "CVE-2025-37797",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37797"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a UAF vulnerability in class handling\n\nThis patch fixes a Use-After-Free vulnerability in the HFSC qdisc class\nhandling. The issue occurs due to a time-of-check/time-of-use condition\nin hfsc_change_class() when working with certain child qdiscs like netem\nor codel.\n\nThe vulnerability works as follows:\n1. hfsc_change_class() checks if a class has packets (q.qlen != 0)\n2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g.,\n codel, netem) might drop packets and empty the queue\n3. The code continues assuming the queue is still non-empty, adding\n the class to vttree\n4. This breaks HFSC scheduler assumptions that only non-empty classes\n are in vttree\n5. Later, when the class is destroyed, this can lead to a Use-After-Free\n\nThe fix adds a second queue length check after qdisc_peek_len() to verify\nthe queue wasn\u0027t emptied.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37797",
"url": "https://www.suse.com/security/cve/CVE-2025-37797"
},
{
"category": "external",
"summary": "SUSE Bug 1242417 for CVE-2025-37797",
"url": "https://bugzilla.suse.com/1242417"
},
{
"category": "external",
"summary": "SUSE Bug 1245793 for CVE-2025-37797",
"url": "https://bugzilla.suse.com/1245793"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-37797"
},
{
"cve": "CVE-2025-38000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38000"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()\n\nWhen enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the\nchild qdisc\u0027s peek() operation before incrementing sch-\u003eq.qlen and\nsch-\u003eqstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may\ntrigger an immediate dequeue and potential packet drop. In such cases,\nqdisc_tree_reduce_backlog() is called, but the HFSC qdisc\u0027s qlen and backlog\nhave not yet been updated, leading to inconsistent queue accounting. This\ncan leave an empty HFSC class in the active list, causing further\nconsequences like use-after-free.\n\nThis patch fixes the bug by moving the increment of sch-\u003eq.qlen and\nsch-\u003eqstats.backlog before the call to the child qdisc\u0027s peek() operation.\nThis ensures that queue length and backlog are always accurate when packet\ndrops or dequeues are triggered during the peek.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38000",
"url": "https://www.suse.com/security/cve/CVE-2025-38000"
},
{
"category": "external",
"summary": "SUSE Bug 1244277 for CVE-2025-38000",
"url": "https://bugzilla.suse.com/1244277"
},
{
"category": "external",
"summary": "SUSE Bug 1245775 for CVE-2025-38000",
"url": "https://bugzilla.suse.com/1245775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38000"
},
{
"cve": "CVE-2025-38079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38079"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: algif_hash - fix double free in hash_accept\n\nIf accept(2) is called on socket type algif_hash with\nMSG_MORE flag set and crypto_ahash_import fails,\nsk2 is freed. However, it is also freed in af_alg_release,\nleading to slab-use-after-free error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38079",
"url": "https://www.suse.com/security/cve/CVE-2025-38079"
},
{
"category": "external",
"summary": "SUSE Bug 1245217 for CVE-2025-38079",
"url": "https://bugzilla.suse.com/1245217"
},
{
"category": "external",
"summary": "SUSE Bug 1245218 for CVE-2025-38079",
"url": "https://bugzilla.suse.com/1245218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38079"
},
{
"cve": "CVE-2025-38083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: prio: fix a race in prio_tune()\n\nGerrard Tai reported a race condition in PRIO, whenever SFQ perturb timer\nfires at the wrong time.\n\nThe race is as follows:\n\nCPU 0 CPU 1\n[1]: lock root\n[2]: qdisc_tree_flush_backlog()\n[3]: unlock root\n |\n | [5]: lock root\n | [6]: rehash\n | [7]: qdisc_tree_reduce_backlog()\n |\n[4]: qdisc_put()\n\nThis can be abused to underflow a parent\u0027s qlen.\n\nCalling qdisc_purge_queue() instead of qdisc_tree_flush_backlog()\nshould fix the race, because all packets will be purged from the qdisc\nbefore releasing the lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38083",
"url": "https://www.suse.com/security/cve/CVE-2025-38083"
},
{
"category": "external",
"summary": "SUSE Bug 1245183 for CVE-2025-38083",
"url": "https://bugzilla.suse.com/1245183"
},
{
"category": "external",
"summary": "SUSE Bug 1245350 for CVE-2025-38083",
"url": "https://bugzilla.suse.com/1245350"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38083"
},
{
"cve": "CVE-2025-38177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: make hfsc_qlen_notify() idempotent\n\nhfsc_qlen_notify() is not idempotent either and not friendly\nto its callers, like fq_codel_dequeue(). Let\u0027s make it idempotent\nto ease qdisc_tree_reduce_backlog() callers\u0027 life:\n\n1. update_vf() decreases cl-\u003ecl_nactive, so we can check whether it is\nnon-zero before calling it.\n\n2. eltree_remove() always removes RB node cl-\u003eel_node, but we can use\n RB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38177",
"url": "https://www.suse.com/security/cve/CVE-2025-38177"
},
{
"category": "external",
"summary": "SUSE Bug 1237312 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1237312"
},
{
"category": "external",
"summary": "SUSE Bug 1245986 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1245986"
},
{
"category": "external",
"summary": "SUSE Bug 1246356 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1246356"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2025-38177",
"url": "https://bugzilla.suse.com/1247374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38177"
},
{
"cve": "CVE-2025-38181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38181"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncalipso: Fix null-ptr-deref in calipso_req_{set,del}attr().\n\nsyzkaller reported a null-ptr-deref in sock_omalloc() while allocating\na CALIPSO option. [0]\n\nThe NULL is of struct sock, which was fetched by sk_to_full_sk() in\ncalipso_req_setattr().\n\nSince commit a1a5344ddbe8 (\"tcp: avoid two atomic ops for syncookies\"),\nreqsk-\u003ersk_listener could be NULL when SYN Cookie is returned to its\nclient, as hinted by the leading SYN Cookie log.\n\nHere are 3 options to fix the bug:\n\n 1) Return 0 in calipso_req_setattr()\n 2) Return an error in calipso_req_setattr()\n 3) Alaways set rsk_listener\n\n1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie\nfor CALIPSO. 3) is also no go as there have been many efforts to reduce\natomic ops and make TCP robust against DDoS. See also commit 3b24d854cb35\n(\"tcp/dccp: do not touch listener sk_refcnt under synflood\").\n\nAs of the blamed commit, SYN Cookie already did not need refcounting,\nand no one has stumbled on the bug for 9 years, so no CALIPSO user will\ncare about SYN Cookie.\n\nLet\u0027s return an error in calipso_req_setattr() and calipso_req_delattr()\nin the SYN Cookie case.\n\nThis can be reproduced by [1] on Fedora and now connect() of nc times out.\n\n[0]:\nTCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\nCPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nRIP: 0010:read_pnet include/net/net_namespace.h:406 [inline]\nRIP: 0010:sock_net include/net/sock.h:655 [inline]\nRIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806\nCode: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b\nRSP: 0018:ffff88811af89038 EFLAGS: 00010216\nRAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400\nRDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030\nRBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e\nR10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000\nR13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050\nFS: 00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0\nPKRU: 80000000\nCall Trace:\n \u003cIRQ\u003e\n ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288\n calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204\n calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597\n netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249\n selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342\n selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551\n security_inet_conn_request+0x50/0xa0 security/security.c:4945\n tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825\n tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275\n tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328\n tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781\n tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667\n tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904\n ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436\n ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491\n dst_input include/net/dst.h:469 [inline]\n ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]\n ip6_rcv_finish+0xb6/0x490 net/ipv6/ip6_input.c:69\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netf\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38181",
"url": "https://www.suse.com/security/cve/CVE-2025-38181"
},
{
"category": "external",
"summary": "SUSE Bug 1246000 for CVE-2025-38181",
"url": "https://bugzilla.suse.com/1246000"
},
{
"category": "external",
"summary": "SUSE Bug 1246001 for CVE-2025-38181",
"url": "https://bugzilla.suse.com/1246001"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38181"
},
{
"cve": "CVE-2025-38212",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38212"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc: fix to protect IPCS lookups using RCU\n\nsyzbot reported that it discovered a use-after-free vulnerability, [0]\n\n[0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/\n\nidr_for_each() is protected by rwsem, but this is not enough. If it is\nnot protected by RCU read-critical region, when idr_for_each() calls\nradix_tree_node_free() through call_rcu() to free the radix_tree_node\nstructure, the node will be freed immediately, and when reading the next\nnode in radix_tree_for_each_slot(), the already freed memory may be read.\n\nTherefore, we need to add code to make sure that idr_for_each() is\nprotected within the RCU read-critical region when we call it in\nshm_destroy_orphaned().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38212",
"url": "https://www.suse.com/security/cve/CVE-2025-38212"
},
{
"category": "external",
"summary": "SUSE Bug 1246029 for CVE-2025-38212",
"url": "https://bugzilla.suse.com/1246029"
},
{
"category": "external",
"summary": "SUSE Bug 1246030 for CVE-2025-38212",
"url": "https://bugzilla.suse.com/1246030"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38212"
},
{
"cve": "CVE-2025-38477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38477"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix race condition on qfq_aggregate\n\nA race condition can occur when \u0027agg\u0027 is modified in qfq_change_agg\n(called during qfq_enqueue) while other threads access it\nconcurrently. For example, qfq_dump_class may trigger a NULL\ndereference, and qfq_delete_class may cause a use-after-free.\n\nThis patch addresses the issue by:\n\n1. Moved qfq_destroy_class into the critical section.\n\n2. Added sch_tree_lock protection to qfq_dump_class and\nqfq_dump_class_stats.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38477",
"url": "https://www.suse.com/security/cve/CVE-2025-38477"
},
{
"category": "external",
"summary": "SUSE Bug 1247314 for CVE-2025-38477",
"url": "https://bugzilla.suse.com/1247314"
},
{
"category": "external",
"summary": "SUSE Bug 1247315 for CVE-2025-38477",
"url": "https://bugzilla.suse.com/1247315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38477"
},
{
"cve": "CVE-2025-38494",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38494"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: do not bypass hid_hw_raw_request\n\nhid_hw_raw_request() is actually useful to ensure the provided buffer\nand length are valid. Directly calling in the low level transport driver\nfunction bypassed those checks and allowed invalid paramto be used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38494",
"url": "https://www.suse.com/security/cve/CVE-2025-38494"
},
{
"category": "external",
"summary": "SUSE Bug 1247349 for CVE-2025-38494",
"url": "https://bugzilla.suse.com/1247349"
},
{
"category": "external",
"summary": "SUSE Bug 1247350 for CVE-2025-38494",
"url": "https://bugzilla.suse.com/1247350"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38494"
},
{
"cve": "CVE-2025-38495",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38495"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: ensure the allocated report buffer can contain the reserved report ID\n\nWhen the report ID is not used, the low level transport drivers expect\nthe first byte to be 0. However, currently the allocated buffer not\naccount for that extra byte, meaning that instead of having 8 guaranteed\nbytes for implement to be working, we only have 7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38495",
"url": "https://www.suse.com/security/cve/CVE-2025-38495"
},
{
"category": "external",
"summary": "SUSE Bug 1247348 for CVE-2025-38495",
"url": "https://bugzilla.suse.com/1247348"
},
{
"category": "external",
"summary": "SUSE Bug 1247351 for CVE-2025-38495",
"url": "https://bugzilla.suse.com/1247351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38495"
},
{
"cve": "CVE-2025-38498",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38498"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndo_change_type(): refuse to operate on unmounted/not ours mounts\n\nEnsure that propagation settings can only be changed for mounts located\nin the caller\u0027s mount namespace. This change aligns permission checking\nwith the rest of mount(2).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38498",
"url": "https://www.suse.com/security/cve/CVE-2025-38498"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2025-38498",
"url": "https://bugzilla.suse.com/1247374"
},
{
"category": "external",
"summary": "SUSE Bug 1247499 for CVE-2025-38498",
"url": "https://bugzilla.suse.com/1247499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38498"
},
{
"cve": "CVE-2025-38499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38499"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns\n\nWhat we want is to verify there is that clone won\u0027t expose something\nhidden by a mount we wouldn\u0027t be able to undo. \"Wouldn\u0027t be able to undo\"\nmay be a result of MNT_LOCKED on a child, but it may also come from\nlacking admin rights in the userns of the namespace mount belongs to.\n\nclone_private_mnt() checks the former, but not the latter.\n\nThere\u0027s a number of rather confusing CAP_SYS_ADMIN checks in various\nuserns during the mount, especially with the new mount API; they serve\ndifferent purposes and in case of clone_private_mnt() they usually,\nbut not always end up covering the missing check mentioned above.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38499",
"url": "https://www.suse.com/security/cve/CVE-2025-38499"
},
{
"category": "external",
"summary": "SUSE Bug 1247976 for CVE-2025-38499",
"url": "https://bugzilla.suse.com/1247976"
},
{
"category": "external",
"summary": "SUSE Bug 1248673 for CVE-2025-38499",
"url": "https://bugzilla.suse.com/1248673"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38499"
},
{
"cve": "CVE-2025-38617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38617"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/packet: fix a race in packet_set_ring() and packet_notifier()\n\nWhen packet_set_ring() releases po-\u003ebind_lock, another thread can\nrun packet_notifier() and process an NETDEV_UP event.\n\nThis race and the fix are both similar to that of commit 15fe076edea7\n(\"net/packet: fix a race in packet_bind() and packet_notifier()\").\n\nThere too the packet_notifier NETDEV_UP event managed to run while a\npo-\u003ebind_lock critical section had to be temporarily released. And\nthe fix was similarly to temporarily set po-\u003enum to zero to keep\nthe socket unhooked until the lock is retaken.\n\nThe po-\u003ebind_lock in packet_set_ring and packet_notifier precede the\nintroduction of git history.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38617",
"url": "https://www.suse.com/security/cve/CVE-2025-38617"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2025-38617",
"url": "https://bugzilla.suse.com/1247374"
},
{
"category": "external",
"summary": "SUSE Bug 1248621 for CVE-2025-38617",
"url": "https://bugzilla.suse.com/1248621"
},
{
"category": "external",
"summary": "SUSE Bug 1249208 for CVE-2025-38617",
"url": "https://bugzilla.suse.com/1249208"
},
{
"category": "external",
"summary": "SUSE Bug 1253291 for CVE-2025-38617",
"url": "https://bugzilla.suse.com/1253291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38617"
},
{
"cve": "CVE-2025-38618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38618"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock: Do not allow binding to VMADDR_PORT_ANY\n\nIt is possible for a vsock to autobind to VMADDR_PORT_ANY. This can\ncause a use-after-free when a connection is made to the bound socket.\nThe socket returned by accept() also has port VMADDR_PORT_ANY but is not\non the list of unbound sockets. Binding it will result in an extra\nrefcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep\nthe binding until socket destruction).\n\nModify the check in __vsock_bind_connectible() to also prevent binding\nto VMADDR_PORT_ANY.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38618",
"url": "https://www.suse.com/security/cve/CVE-2025-38618"
},
{
"category": "external",
"summary": "SUSE Bug 1248511 for CVE-2025-38618",
"url": "https://bugzilla.suse.com/1248511"
},
{
"category": "external",
"summary": "SUSE Bug 1249207 for CVE-2025-38618",
"url": "https://bugzilla.suse.com/1249207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38618"
},
{
"cve": "CVE-2025-38644",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38644"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: reject TDLS operations when station is not associated\n\nsyzbot triggered a WARN in ieee80211_tdls_oper() by sending\nNL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT,\nbefore association completed and without prior TDLS setup.\n\nThis left internal state like sdata-\u003eu.mgd.tdls_peer uninitialized,\nleading to a WARN_ON() in code paths that assumed it was valid.\n\nReject the operation early if not in station mode or not associated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38644",
"url": "https://www.suse.com/security/cve/CVE-2025-38644"
},
{
"category": "external",
"summary": "SUSE Bug 1247374 for CVE-2025-38644",
"url": "https://bugzilla.suse.com/1247374"
},
{
"category": "external",
"summary": "SUSE Bug 1248748 for CVE-2025-38644",
"url": "https://bugzilla.suse.com/1248748"
},
{
"category": "external",
"summary": "SUSE Bug 1248749 for CVE-2025-38644",
"url": "https://bugzilla.suse.com/1248749"
},
{
"category": "external",
"summary": "SUSE Bug 1253291 for CVE-2025-38644",
"url": "https://bugzilla.suse.com/1253291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_231-default-18-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T02:04:00Z",
"details": "important"
}
],
"title": "CVE-2025-38644"
}
]
}
WID-SEC-W-2024-3251
Vulnerability from csaf_certbund - Published: 2024-10-21 22:00 - Updated: 2026-05-20 22:00Summary
Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff: Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen oder andere, nicht näher bekannte Auswirkungen zu erzielen..
Betroffene Betriebssysteme: - Linux
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
Affected products
Known affected
28 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Dell NetWorker
Dell / NetWorker
|
cpe:/a:dell:networker:virtual
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
Oracle Linux
Oracle / Linux
|
cpe:/o:oracle:linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
IBM Security Guardium 12.0
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:12.0
|
12 | |
|
Dell PowerProtect Data Domain <7.13.1.40
Dell / PowerProtect Data Domain
|
<7.13.1.40 | ||
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Dell PowerProtect Data Domain <7.10.1.70
Dell / PowerProtect Data Domain
|
<7.10.1.70 | ||
|
Dell PowerProtect Data Domain <8.3.1.10
Dell / PowerProtect Data Domain
|
<8.3.1.10 | ||
|
NetApp AFF Baseboard Management Controller
NetApp / AFF
|
cpe:/h:netapp:aff:::baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerScale OneFS <4.0.33
Dell / PowerScale OneFS
|
<4.0.33 | ||
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
Dell Avamar
Dell
|
cpe:/a:dell:avamar:-
|
— | |
|
Kyocera Printer
Kyocera
|
cpe:/h:kyocera:printer:-
|
— | |
|
SolarWinds Security Event Manager <2025.2.1
SolarWinds / Security Event Manager
|
<2025.2.1 | ||
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE / Linux
|
cpe:/o:suse:suse_linux:-
|
— | |
|
NetApp FAS Baseboard Management Controller
NetApp / FAS
|
cpe:/h:netapp:fas:baseboard_management_controller
|
Baseboard Management Controller | |
|
Dell PowerProtect Data Domain <8.4.0.0
Dell / PowerProtect Data Domain
|
<8.4.0.0 | ||
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
NetApp StorageGRID
NetApp
|
cpe:/a:netapp:storagegrid:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— | |
|
Dell NetWorker Virtual Edition
Dell / NetWorker
|
cpe:/a:dell:networker:virtual_edition
|
Virtual Edition | |
|
IBM QRadar SIEM <7.5.0 UP11 IF02
IBM / QRadar SIEM
|
<7.5.0 UP11 IF02 |
References
1013 references
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder andere, nicht n\u00e4her bekannte Auswirkungen zu erzielen..",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3251 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3251.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3251 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3251"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10943 vom 2024-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-10943.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7154-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7154-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7155-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7155-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7156-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7156-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12868 vom 2024-12-09",
"url": "https://linux.oracle.com/errata/ELSA-2024-12868.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09",
"url": "https://ubuntu.com/security/notices/USN-7144-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4317-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4313-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PCO2TL4OCZ4YUXTF7OMLI6WH3WKDUC2G/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-4 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7169-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7185-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7185-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7196-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7196-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7195-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7194-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7186-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7166-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4397-1 vom 2024-12-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-2 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7173-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11486 vom 2024-12-19",
"url": "https://access.redhat.com/errata/RHSA-2024:11486"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2024-12887.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:10944 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:10944"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-2 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7169-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-3 vom 2025-01-07",
"url": "https://ubuntu.com/security/notices/USN-7169-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7167-2 vom 2025-01-07",
"url": "https://ubuntu.com/security/notices/USN-7167-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11486 vom 2025-01-07",
"url": "https://linux.oracle.com/errata/ELSA-2024-11486.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7154-2 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7154-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7184-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7184-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7187-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7187-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7186-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7183-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7183-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0035-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10942 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10942"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10939 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10939"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10943 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10943"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10944 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10944"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-5 vom 2025-01-10",
"url": "https://ubuntu.com/security/notices/USN-7169-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17",
"url": "https://linux.oracle.com/errata/ELSA-2024-12884.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-074 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4388-1 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-059 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-059.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-088 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-088.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4008 vom 2025-01-03",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47726",
"url": "https://lore.kernel.org/linux-cve-announce/2024102104-CVE-2024-47726-ae53@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47729",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47729-8985@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47730",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47730-2f1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47731",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47731-fd73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47732",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47732-f8aa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50003",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-50003-43bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47733",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47733-6591@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47734",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47734-ad75@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47735",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47735-5d51@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50004",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50004-101e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50005",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50005-3479@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50006",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-50006-fe44@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50007",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50007-0253@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50008",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50008-0152@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50009",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50009-1b62@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50010",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50010-57e8@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50011",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50011-98c9@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50012",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-50012-db7d@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49863",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-49863-6a74@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50013",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50013-05ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50014",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50014-d684@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50015",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50015-1eb0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50016",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50016-745a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50017",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-50017-f157@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50018",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-50018-65e9@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47749",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47749-c227@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47750",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47750-390b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47751",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47751-7a96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47752",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47752-1b11@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49864",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49864-5158@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49865",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49865-ae89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49866",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49866-159b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49867",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49867-b47a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49868",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-49868-8dce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47753",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47753-45cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47754",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47754-a412@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49869",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49869-f804@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49870",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49870-44f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49871",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49871-1293@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49872",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49872-16d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49873",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-49873-3190@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47755",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47755-2cb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47756",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47756-1c60@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47757",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47757-2b1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49874",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49874-6deb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49876",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49876-7fe2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49877",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49877-038a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49885",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49885-d5d0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49886",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49886-3477@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49887",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49887-04ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49888",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49888-027c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49889",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-49889-6140@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49890",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49890-ba65@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49891",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49891-931a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49892",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49892-b04d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49893",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49893-72a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49894",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-49894-08a0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49858",
"url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49858-b7c4@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49859",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49859-9917@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49860",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49860-2a48@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49861",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49861-5288@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49862",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49862-b995@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50022",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50022-0531@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50023",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50023-0e72@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50024",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50024-a052@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49955",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49955-f517@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50025",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50025-38d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50026",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50026-a7cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50027",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50027-91e1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50028",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50028-5655@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49959",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49959-ce09@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49960",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49960-f9cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49961",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49961-7541@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49962",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49962-8d16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49963",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49963-a198@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49964",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49964-e06e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50043",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50043-86f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50044",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50044-2ee1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50045",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50045-283d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50046",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50046-a9b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50047",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50047-7a27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50048",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50048-f299@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50049",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50049-26da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50055",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-50055-7d1f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50056",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50056-78bf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50057",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50057-d046@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50058",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50058-e827@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50059",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50059-4ccd@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50060",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-50060-6994@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49985",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49985-0b2a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49986",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49986-19eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49987",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49987-e897@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50061",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50061-50ab@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50062",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50062-1ea1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50063",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50063-1a59@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50064",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50064-33d1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50065",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-50065-c751@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49988",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49988-89d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49989",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49989-8165@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49990",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49990-c3e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49991",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49991-59d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49992",
"url": "https://lore.kernel.org/linux-cve-announce/2024102137-CVE-2024-49992-fd66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49993",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49993-5b57@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49994",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49994-de99@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49995",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49995-ec59@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49996",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49996-0d29@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49997",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2024-49997-0d01@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49998",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-49998-1a69@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49999",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-49999-e815@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50000",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50000-c542@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50001",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50001-67e4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50002",
"url": "https://lore.kernel.org/linux-cve-announce/2024102139-CVE-2024-50002-bdfd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48983",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48983-7e0c@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48987",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48987-c88b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48988",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48988-188f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48989",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48989-54c3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48990",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48990-1cf1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48991",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48991-3987@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48992",
"url": "https://lore.kernel.org/linux-cve-announce/2024102148-CVE-2022-48992-2962@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49850",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2024-49850-4cc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49851",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2024-49851-edd9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49852",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2024-49852-875e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49016",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49016-c7bb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49017",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49017-ae90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49018",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49018-7ee3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49019",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49019-435d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49853",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49853-b3ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49854",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49854-1ba5@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49855",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2024-49855-8997@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49020",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49020-2d32@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49021",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49021-9979@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49022",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49022-c605@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49023",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49023-381d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49024",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2022-49024-e31a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49856",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2024-49856-f5f7@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49857",
"url": "https://lore.kernel.org/linux-cve-announce/2024102154-CVE-2024-49857-7233@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49025",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49025-4bcc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49026",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49026-f8d1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49027",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49027-3006@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49028",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49028-78e7@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49029",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49029-0ffd@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49030",
"url": "https://lore.kernel.org/linux-cve-announce/2024102155-CVE-2022-49030-cee8@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49031",
"url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49031-5b75@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49032",
"url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49032-d2a1@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49033",
"url": "https://lore.kernel.org/linux-cve-announce/2024102156-CVE-2022-49033-a8c6@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2023-52917",
"url": "https://lore.kernel.org/linux-cve-announce/2024102100-CVE-2023-52917-f16d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47675",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47675-643d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47722",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47722-dc6e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47723",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47723-d904@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47724",
"url": "https://lore.kernel.org/linux-cve-announce/2024102103-CVE-2024-47724-c771@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47725",
"url": "https://lore.kernel.org/linux-cve-announce/2024102104-CVE-2024-47725-f698@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47676",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47676-016b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47727",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47727-1049@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47728",
"url": "https://lore.kernel.org/linux-cve-announce/2024102105-CVE-2024-47728-824a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47677",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47677-714d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47678",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47678-0b1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47679",
"url": "https://lore.kernel.org/linux-cve-announce/2024102106-CVE-2024-47679-e793@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47680",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47680-194f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47681",
"url": "https://lore.kernel.org/linux-cve-announce/2024102107-CVE-2024-47681-bd36@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47682",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47682-0582@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47683",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47683-8cf2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47684",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47684-4869@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47736",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47736-712a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47737",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47737-b77e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47738",
"url": "https://lore.kernel.org/linux-cve-announce/2024102108-CVE-2024-47738-3f0e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47685",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47685-af1e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47686",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47686-e46a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47687",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47687-9a03@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47739",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47739-8bc4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47740",
"url": "https://lore.kernel.org/linux-cve-announce/2024102109-CVE-2024-47740-ae86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47688",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47688-0fe1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47689",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47689-cdec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47690",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47690-113f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47741",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47741-5974@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47742",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47742-b72d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47743",
"url": "https://lore.kernel.org/linux-cve-announce/2024102110-CVE-2024-47743-77c3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47691",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47691-ab21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47692",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47692-38d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47744",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47744-7571@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47745",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47745-42e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47746",
"url": "https://lore.kernel.org/linux-cve-announce/2024102111-CVE-2024-47746-f737@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47693",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47693-f12d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47694",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47694-5594@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47695",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47695-2d7b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47747",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47747-8dca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47748",
"url": "https://lore.kernel.org/linux-cve-announce/2024102112-CVE-2024-47748-a134@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47696",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47696-e1f7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47697",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47697-5277@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47698",
"url": "https://lore.kernel.org/linux-cve-announce/2024102113-CVE-2024-47698-d5fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47699",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47699-c54c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47700",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47700-00ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47701",
"url": "https://lore.kernel.org/linux-cve-announce/2024102114-CVE-2024-47701-7db5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47702",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47702-c5c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47703",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-47703-36ea@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49875",
"url": "https://lore.kernel.org/linux-cve-announce/2024102115-CVE-2024-49875-02ba@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47704",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47704-d937@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47705",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47705-12bc@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47706",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-47706-7312@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49883",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49883-ca93@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49884",
"url": "https://lore.kernel.org/linux-cve-announce/2024102116-CVE-2024-49884-fa56@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47707",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47707-d8db@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47708",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47708-2b8f@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47709",
"url": "https://lore.kernel.org/linux-cve-announce/2024102117-CVE-2024-47709-8e66@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47710",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47710-3882@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47711",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47711-349d@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47712",
"url": "https://lore.kernel.org/linux-cve-announce/2024102118-CVE-2024-47712-13c2@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47713",
"url": "https://lore.kernel.org/linux-cve-announce/2024102119-CVE-2024-47713-2624@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47714",
"url": "https://lore.kernel.org/linux-cve-announce/2024102119-CVE-2024-47714-f88b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47715",
"url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47715-ff4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47716",
"url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47716-72df@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47717",
"url": "https://lore.kernel.org/linux-cve-announce/2024102120-CVE-2024-47717-f7fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47718",
"url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47718-c7cd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47719",
"url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47719-09a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47720",
"url": "https://lore.kernel.org/linux-cve-announce/2024102121-CVE-2024-47720-c007@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-47721",
"url": "https://lore.kernel.org/linux-cve-announce/2024102122-CVE-2024-47721-cb0a@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49915",
"url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49915-42ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49916",
"url": "https://lore.kernel.org/linux-cve-announce/2024102123-CVE-2024-49916-3384@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49920",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49920-038d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49921",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49921-621b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49922",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49922-5435@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49923",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49923-3462@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49924",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49924-93af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49925",
"url": "https://lore.kernel.org/linux-cve-announce/2024102124-CVE-2024-49925-b469@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49926",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49926-f707@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49927",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49927-86cf@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49928",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49928-05d6@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49929",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49929-1031@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49930",
"url": "https://lore.kernel.org/linux-cve-announce/2024102125-CVE-2024-49930-34e8@gregkh/#u"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50019",
"url": "https://lore.kernel.org/linux-cve-announce/2024102126-CVE-2024-50019-5896@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50020",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50020-e41a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50021",
"url": "https://lore.kernel.org/linux-cve-announce/2024102129-CVE-2024-50021-d60d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49956",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-49956-5278@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50029",
"url": "https://lore.kernel.org/linux-cve-announce/2024102130-CVE-2024-50029-8df2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49957",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49957-3302@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49958",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-49958-1bc6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50030",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50030-13ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50031",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50031-c158@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50032",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50032-e7ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50033",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50033-ce5e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50034",
"url": "https://lore.kernel.org/linux-cve-announce/2024102131-CVE-2024-50034-46ef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49965",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49965-9ed0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49966",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-49966-2893@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50035",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50035-82d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50036",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50036-9d91@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50037",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50037-770e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50038",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50038-dc41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50039",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50039-41b0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50040",
"url": "https://lore.kernel.org/linux-cve-announce/2024102132-CVE-2024-50040-f156@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49967",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49967-a58a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49968",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49968-ce10@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49969",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49969-cf83@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49970",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49970-a345@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49971",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-49971-ad07@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50041",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50041-6118@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-50042",
"url": "https://lore.kernel.org/linux-cve-announce/2024102133-CVE-2024-50042-ca9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49972",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49972-9c6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49973",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49973-8824@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49974",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49974-bda6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49975",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49975-4533@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49976",
"url": "https://lore.kernel.org/linux-cve-announce/2024102134-CVE-2024-49976-83a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49977",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49977-b657@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49978",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49978-2bff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49979",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49979-f897@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49980",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49980-da73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49981",
"url": "https://lore.kernel.org/linux-cve-announce/2024102135-CVE-2024-49981-0fb7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49982",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49982-c6b7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49983",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49983-275e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2024-49984",
"url": "https://lore.kernel.org/linux-cve-announce/2024102136-CVE-2024-49984-e47f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48946",
"url": "https://lore.kernel.org/linux-cve-announce/2024102138-CVE-2022-48946-5989@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48947",
"url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48947-0ab5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48948",
"url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48948-588a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48949",
"url": "https://lore.kernel.org/linux-cve-announce/2024102140-CVE-2022-48949-a7a1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48950",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48950-dc5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48951",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48951-da5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48952",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48952-a932@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48953",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48953-c6c0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48954",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48954-30f2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48955",
"url": "https://lore.kernel.org/linux-cve-announce/2024102141-CVE-2022-48955-d31e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48956",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48956-75c8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48957",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48957-8250@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48958",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48958-bb88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48959",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48959-6120@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48960",
"url": "https://lore.kernel.org/linux-cve-announce/2024102142-CVE-2022-48960-c9af@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48961",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48961-d44b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48962",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48962-1842@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48963",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48963-9cf2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48964",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48964-8230@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48965",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48965-0039@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48966",
"url": "https://lore.kernel.org/linux-cve-announce/2024102143-CVE-2022-48966-d8f6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48967",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48967-c2ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48968",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48968-9b4a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48969",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48969-8fe7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48970",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48970-7c96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48971",
"url": "https://lore.kernel.org/linux-cve-announce/2024102144-CVE-2022-48971-6025@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48972",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48972-4ccd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48973",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48973-a0e7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48974",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48974-d2d0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48975",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48975-d7f9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48976",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48976-2980@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48977",
"url": "https://lore.kernel.org/linux-cve-announce/2024102145-CVE-2022-48977-0990@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48978",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48978-8a19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48979",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48979-d40f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48980",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48980-0fec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48981",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48981-a877@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48982",
"url": "https://lore.kernel.org/linux-cve-announce/2024102146-CVE-2022-48982-717d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48984",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48984-ea9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48985",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48985-40b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48986",
"url": "https://lore.kernel.org/linux-cve-announce/2024102147-CVE-2022-48986-cd7d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48993",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48993-8b27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48994",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48994-530f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48995",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48995-8d2e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48996",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48996-e9ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48997",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48997-cd65@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48998",
"url": "https://lore.kernel.org/linux-cve-announce/2024102149-CVE-2022-48998-1016@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-48999",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-48999-c5fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49000",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49000-2c9c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49001",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49001-589c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49002",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49002-5b24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49003",
"url": "https://lore.kernel.org/linux-cve-announce/2024102150-CVE-2022-49003-482c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49004",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49004-18ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49005",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49005-c5ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49006",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49006-83c9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49007",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49007-c02b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49008",
"url": "https://lore.kernel.org/linux-cve-announce/2024102151-CVE-2022-49008-d62f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49009",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49009-9bee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49010",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49010-f8e1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49011",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49011-069a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49012",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49012-8eb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49013",
"url": "https://lore.kernel.org/linux-cve-announce/2024102152-CVE-2022-49013-dd61@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49014",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49014-1627@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2022-49015",
"url": "https://lore.kernel.org/linux-cve-announce/2024102153-CVE-2022-49015-1fd0@gregkh/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7088-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04",
"url": "https://ubuntu.com/security/notices/USN-7088-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06",
"url": "https://ubuntu.com/security/notices/USN-7088-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-10939 vom 2024-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-10939.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11",
"url": "https://ubuntu.com/security/notices/USN-7100-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12813 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12813.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7100-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12815.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3985-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KB6DG7QR5KXDQRV57H4IY2TB2LW42K4S/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3983-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QUOFKELDJYP3JMHIXPCVKVI4REVXAKTX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7088-5"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14500-1 vom 2024-11-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7119-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4038-1 vom 2024-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7123-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5818 vom 2024-11-24",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00233.html"
},
{
"category": "external",
"summary": "Google Container-Optimized OS Release Notes vom 2024-11-18",
"url": "https://cloud.google.com/container-optimized-os/docs/release-notes#November_18_2024"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4081-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4082-1 vom 2024-11-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4131-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4157-1 vom 2024-12-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019904.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7170-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7170-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7173-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4367-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4345-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4346-1 vom 2024-12-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2FJJW5HEWYSYWAJBRWARBIZ4AQHAXLNG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7169-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7169-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7167-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7167-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7166-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0089-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0090-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020101.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0106-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14",
"url": "https://ubuntu.com/security/notices/USN-7195-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0094-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0097-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0105-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0098-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020106.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0100-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0103-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0108-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020111.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0111-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2IXCN5JTEUUWORLKQVOQYQKMHTJ73CSG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0114-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YC7MKFCHLBJHUQM2SLPOGVG4DUWP2J4E/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0112-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VKNKHAJX3LTXNPTXUJXVJL67P2P7Z7YO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0110-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PLWCG227VUGPKNXHW6FOCW727UUPVLLU/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-3 vom 2025-01-15",
"url": "https://ubuntu.com/security/notices/USN-7173-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0124-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0132-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/U2TCRAW6MN33ZU3TBEQGGYRWFSJ6BPOU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0131-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0123-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020126.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0136-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2VG6PE7ZMNWIM7E4TIKCXL4DVBGBXJN5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0137-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHBMZ4MND2ONRG4N26VJNJGAZBXMYEDV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0138-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ET3TDUWYDTZV554NRC7LB5HGM4TCIIGZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0146-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C6ANXHEO54VUUFEWI6QYB2M3L2SS7OOW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0172-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020164.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0177-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020162.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0164-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0185-1 vom 2025-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020171.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0180-1 vom 2025-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020174.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0181-1 vom 2025-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-1 vom 2025-01-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YFCZRPOJ45QWVUSJAEK53OBSFTOQ3W5H/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-079 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-079.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-078 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0240-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCBYAV5OJRXD362FDCZUSIHNHOURONCF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0239-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBKJOKHJGUZRHPVCGSRZVBF6ZMI7KJY7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0238-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNU4IXTEAXCI7QNPC2AVXZICYTGC4XXI/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-090 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-090.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-061 vom 2025-01-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-061.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0249-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0253-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0246-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0245-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0244-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0254-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020213.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0260-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0264-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0243-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20066 vom 2025-01-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-20066.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7237-1 vom 2025-01-28",
"url": "https://ubuntu.com/security/notices/USN-7237-1"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14705-1 vom 2025-01-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0289-1 vom 2025-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-198 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-198.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-196 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-196.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-092 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-092.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-195 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-195.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-197 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-197.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2745 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2745.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1957 vom 2025-02-05",
"url": "https://alas.aws.amazon.com/ALAS-2025-1957.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5860 vom 2025-02-08",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00023.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20095 vom 2025-02-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20095.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0410-1 vom 2025-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020306.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0428-1 vom 2025-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0426-1 vom 2025-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020303.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0440-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020319.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20100 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0462-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CNVHBWUSJZEY34QR6GDPRY55WG3UIDSL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0476-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VFHWMM4XIDZD22QFLM3OSRWWSFFBUTZM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0494-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6OLOLTOPB2LMYQP5ZEWFA5S443WHFDIQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0486-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XWFV7VUE5TX6GKXVI46R6ZIDRFEXHKUZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0489-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OCZ53J3OQFQB3VZIF7V6BL32FWNAV3CH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0462-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNVHBWUSJZEY34QR6GDPRY55WG3UIDSL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0449-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020322.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0494-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6OLOLTOPB2LMYQP5ZEWFA5S443WHFDIQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0487-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QIBJK3XANPM2U6AEOTGJ27N3L472DCRE/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0455-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020321.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0452-1 vom 2025-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020320.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0465-1 vom 2025-02-12",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IZBNMZ4JWAINQUJYDC5JJYGAKWUST46Z/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0499-1 vom 2025-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0557-1 vom 2025-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0565-1 vom 2025-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0564-1 vom 2025-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1960 vom 2025-02-19",
"url": "https://alas.aws.amazon.com/ALAS-2025-1960.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7276-1 vom 2025-02-19",
"url": "https://ubuntu.com/security/notices/USN-7276-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7277-1 vom 2025-02-19",
"url": "https://ubuntu.com/security/notices/USN-7277-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7288-1 vom 2025-02-24",
"url": "https://ubuntu.com/security/notices/USN-7288-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-1 vom 2025-02-24",
"url": "https://ubuntu.com/security/notices/USN-7289-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7291-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7291-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7288-2 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7288-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7293-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7293-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7184085 vom 2025-02-25",
"url": "https://www.ibm.com/support/pages/node/7184085"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-2 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7289-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-3 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7289-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7295-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2759 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2759.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7294-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-094 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-094.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-063 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-063.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7301-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7301-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7294-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7289-4 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7289-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7308-1 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7308-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7294-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7303-2 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7303-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7310-1 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7310-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7311-1 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7311-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4075 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4076 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03",
"url": "https://ubuntu.com/security/notices/USN-7294-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7303-3 vom 2025-03-03",
"url": "https://ubuntu.com/security/notices/USN-7303-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2270 vom 2025-03-05",
"url": "https://access.redhat.com/errata/RHSA-2025:2270"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1912 vom 2025-03-05",
"url": "https://access.redhat.com/errata/RHSA-2025:1912"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7333-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7333-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7332-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0784-1 vom 2025-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7331-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7331-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-203 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-203.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-204 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-204.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-205 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-205.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-202 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-202.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1961 vom 2025-03-06",
"url": "https://alas.aws.amazon.com/ALAS-2025-1961.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2775 vom 2025-03-07",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2775.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20152 vom 2025-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20152.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185244 vom 2025-03-10",
"url": "https://www.ibm.com/support/pages/node/7185244"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0834-1 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7344-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7342-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7342-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0201-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-2 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7332-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-3 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7332-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0847-1 vom 2025-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-2 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7344-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-082 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-082.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0856-1 vom 2025-03-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/OSPHACQPT5GWCIN3WJL55RCYA4OHTBLI/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-083 vom 2025-03-14",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-083.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1966 vom 2025-03-17",
"url": "https://alas.aws.amazon.com/ALAS-2025-1966.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0955-1 vom 2025-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20190 vom 2025-03-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-20190.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2800 vom 2025-03-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2800.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7388-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7388-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7386-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7386-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7387-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7385-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7385-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7383-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7383-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7384-1 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7384-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7383-2 vom 2025-03-27",
"url": "https://ubuntu.com/security/notices/USN-7383-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7391-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7389-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7389-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7393-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7390-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7390-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7387-3 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7387-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4102 vom 2025-04-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7384-2 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7384-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7401-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7403-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7403-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1114-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GFUVKSUXYRNYGI6ZX3V2THDXSA47UNT/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7407-1 vom 2025-04-02",
"url": "https://ubuntu.com/security/notices/USN-7407-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1121-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/N43CHCB2GP64EHTUHJOPVKKKNZQRWP2Y/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1119-1 vom 2025-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SBLYTUS3TCCWSW237VUH6AAY5NVYUZ3T/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1139-1 vom 2025-04-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MMCQJLNQTFQY3ASC2RY677DDWALMOJCQ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7413-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1123-1 vom 2025-04-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RBJNUDBE6VPHIDCFIVWE7AFUQ2E2P436/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7421-1 vom 2025-04-07",
"url": "https://ubuntu.com/security/notices/USN-7421-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1176-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7428-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7428-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7428-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7428-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1225-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IMQIDOZZ3LRBGKAI3UWUKDCXNJWRXYGY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1213-1 vom 2025-04-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/64D5YFJLDESGQOR3OGPOEV5S4M3DYYAU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1231-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020693.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20271 vom 2025-04-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-20271.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1236-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020691.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1254-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020695.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1241-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1248-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020697.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1259-1 vom 2025-04-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020698.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1260-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5C772I5KLAAUMXFCSPXGHE5ETFPZGIIY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1278-1 vom 2025-04-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020701.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1262-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YQ5OGGLUK4JYNQDMHQJCE7NAM5KWAUQ6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2826 vom 2025-04-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2826.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1970 vom 2025-04-17",
"url": "https://alas.aws.amazon.com/ALAS-2025-1970.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7451-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7451-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7453-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7453-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7452-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7452-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7449-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7450-1 vom 2025-04-23",
"url": "https://ubuntu.com/security/notices/USN-7450-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7449-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7449-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7459-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7463-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7461-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7462-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7462-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-2 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7461-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7458-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7458-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5907 vom 2025-04-27",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00069.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7459-2 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7459-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7468-1 vom 2025-04-28",
"url": "https://ubuntu.com/security/notices/USN-7468-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-227 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-227.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-224 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-224.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-100 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-100.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-070 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-070.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-226 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-226.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-225 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-225.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASLIVEPATCH-2025-228 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASLIVEPATCH-2025-228.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-090 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-090.html"
},
{
"category": "external",
"summary": "Kyocera Downloads",
"url": "https://www.kyoceradocumentsolutions.us/en/support/downloads.name-L3VzL2VuL3NvZnR3YXJlL0tZT0NFUkFERVZJQ0VNQU5BR0VS.html#tab=application"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7461-3 vom 2025-05-02",
"url": "https://ubuntu.com/security/notices/USN-7461-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4509 vom 2025-05-06",
"url": "https://access.redhat.com/errata/RHSA-2025:4509"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-1 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-2 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-5 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-3 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7496-4 vom 2025-05-07",
"url": "https://ubuntu.com/security/notices/USN-7496-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13",
"url": "https://ubuntu.com/security/notices/USN-7506-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7532 vom 2025-05-14",
"url": "https://access.redhat.com/errata/RHSA-2025:7532"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:6966"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7531 vom 2025-05-14",
"url": "https://access.redhat.com/errata/RHSA-2025:7531"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7676 vom 2025-05-15",
"url": "https://access.redhat.com/errata/RHSA-2025:7676"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7683 vom 2025-05-16",
"url": "https://access.redhat.com/errata/RHSA-2025:7683"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7516-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7514-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-7531 vom 2025-05-17",
"url": "http://linux.oracle.com/errata/ELSA-2025-7531.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7515-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7511-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7512-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7512-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7510-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7517-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7518-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7518-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7522-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7515-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7516-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-4 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7511-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7511-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-5 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7510-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7523-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-2 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7517-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01614-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020870.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01640-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020861.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-4 vom 2025-05-21",
"url": "https://ubuntu.com/security/notices/USN-7516-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01620-1 vom 2025-05-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020867.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-5 vom 2025-05-23",
"url": "https://ubuntu.com/security/notices/USN-7516-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7524-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01707-1 vom 2025-05-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020902.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7517-3 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7517-3"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-6 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7516-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-6 vom 2025-05-27",
"url": "https://ubuntu.com/security/notices/USN-7510-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-7 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7510-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7510-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7510-8"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-8 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-9 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-9"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7516-7 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7516-7"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20285-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20283-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20249-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20248-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-1 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20206-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20191-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-2 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7553-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7554-3 vom 2025-06-04",
"url": "https://ubuntu.com/security/notices/USN-7554-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20165-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021174.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20166-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-095 vom 2025-06-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-095.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7593-1 vom 2025-06-24",
"url": "https://ubuntu.com/security/notices/USN-7593-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-3 vom 2025-06-06",
"url": "https://ubuntu.com/security/notices/USN-7553-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-5 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-6 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-6"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01840-1 vom 2025-06-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021434.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7553-4 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7553-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01853-1 vom 2025-06-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021441.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01869-1 vom 2025-06-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021449.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01873-1 vom 2025-06-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021451.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20372 vom 2025-06-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-20372.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20386-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021483.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20388-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021481.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20384-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021485.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01930-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021497.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20381-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021488.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01932-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021501.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20400-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021522.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250613-0011 vom 2025-06-13",
"url": "https://security.netapp.com/advisory/NTAP-20250613-0011"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20397-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021525.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01964-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7602-1 vom 2025-06-26",
"url": "https://ubuntu.com/security/notices/USN-7602-1"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250627-0002 vom 2025-06-27",
"url": "https://security.netapp.com/advisory/NTAP-20250627-0002"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250627-0005 vom 2025-06-27",
"url": "https://security.netapp.com/advisory/NTAP-20250627-0005"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01",
"url": "https://ubuntu.com/security/notices/USN-7607-1"
},
{
"category": "external",
"summary": "SEM 2025.2.1 release notes vom 2025-07-02",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-3 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7608-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-2 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7608-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-1 vom 2025-07-01",
"url": "https://ubuntu.com/security/notices/USN-7608-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7607-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-4 vom 2025-07-03",
"url": "https://ubuntu.com/security/notices/USN-7608-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-2 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7627-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-5 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7608-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7627-1 vom 2025-07-08",
"url": "https://ubuntu.com/security/notices/USN-7627-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7607-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02254-1 vom 2025-07-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021770.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0113-1 vom 2025-07-10",
"url": "https://ubuntu.com/security/notices/LSN-0113-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-6 vom 2025-07-11",
"url": "https://ubuntu.com/security/notices/USN-7608-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02307-1 vom 2025-07-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021804.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02333-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021830.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7640-1 vom 2025-07-16",
"url": "https://ubuntu.com/security/notices/USN-7640-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7653-1 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7653-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-1 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7651-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7652-1 vom 2025-07-17",
"url": "https://ubuntu.com/security/notices/USN-7652-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-2 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7651-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7655-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-3 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7651-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7654-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-4 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7651-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-5 vom 2025-07-24",
"url": "https://ubuntu.com/security/notices/USN-7651-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7651-6 vom 2025-07-24",
"url": "https://ubuntu.com/security/notices/USN-7651-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-1 vom 2025-07-25",
"url": "https://ubuntu.com/security/notices/USN-7671-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-2 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7671-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7654-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7608-7 vom 2025-07-30",
"url": "https://ubuntu.com/security/notices/USN-7608-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-2 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-1 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7684-3 vom 2025-07-31",
"url": "https://ubuntu.com/security/notices/USN-7684-3"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-100 vom 2025-08-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-100.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-105 vom 2025-08-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-105.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7671-3 vom 2025-08-04",
"url": "https://ubuntu.com/security/notices/USN-7671-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7686-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2025-101 vom 2025-08-09",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2025-101.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-106 vom 2025-08-09",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-106.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13",
"url": "https://ubuntu.com/security/notices/USN-7685-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02846-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022192.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-1 vom 2025-08-19",
"url": "https://ubuntu.com/security/notices/USN-7701-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-2 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7701-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-3 vom 2025-08-21",
"url": "https://ubuntu.com/security/notices/USN-7701-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7712-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7711-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7727-1 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7727-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7727-2 vom 2025-08-29",
"url": "https://ubuntu.com/security/notices/USN-7727-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7712-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7727-3 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7727-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7737-1 vom 2025-09-03",
"url": "https://ubuntu.com/security/notices/USN-7737-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15008 vom 2025-09-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-15008.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20551 vom 2025-09-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-20551.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03097-1 vom 2025-09-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022420.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03108-1 vom 2025-09-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022413.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03124-1 vom 2025-09-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJXQ5TFHHXOY34RCSJPZ32PXICETJJAT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03130-1 vom 2025-09-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OI7XTGACEWQ2UDCZMU7BMJ53EJTK4DLT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03135-1 vom 2025-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022453.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03156-1 vom 2025-09-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSLXEYDHEPXZRRM6QVD2CNPFQE4HV4IH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03175-1 vom 2025-09-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022497.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03181-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022513.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03186-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022508.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03191-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022516.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03190-1 vom 2025-09-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022518.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03209-1 vom 2025-09-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYKN5NGIGIUIQOD7ME5J7EMEHPSJ3AGG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03223-1 vom 2025-09-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022534.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7937-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7937-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-5 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7909-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7930-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7930-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7930-2 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7930-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7933-1 vom 2025-12-15",
"url": "https://ubuntu.com/security/notices/USN-7933-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03226-1 vom 2025-09-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEHWYIR3R7GHFMEAF5GZVX6OYPVERDIJ/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-089 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-089.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7755-1 vom 2025-09-17",
"url": "https://ubuntu.com/security/notices/USN-7755-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20714-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022558.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7755-2 vom 2025-09-17",
"url": "https://ubuntu.com/security/notices/USN-7755-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20711-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022561.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20703-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022569.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20698-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022573.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03272-1 vom 2025-09-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022589.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03290-1 vom 2025-09-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022602.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6009 vom 2025-09-23",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00173.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03301-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022605.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7755-3 vom 2025-09-24",
"url": "https://ubuntu.com/security/notices/USN-7755-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03329-1 vom 2025-09-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022616.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03315-1 vom 2025-09-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022621.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03341-1 vom 2025-09-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022629.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03337-1 vom 2025-09-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022626.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03358-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022638.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03382-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022721.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20768-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03374-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022694.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20722-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022683.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20782-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022656.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20766-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022675.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20784-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022713.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20723-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022689.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03370-1 vom 2025-09-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022642.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03406-1 vom 2025-09-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022732.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03393-1 vom 2025-09-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022740.html"
},
{
"category": "external",
"summary": "Dell Security Update vom 2025-10-02",
"url": "https://www.dell.com/support/kbdoc/000376224"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7796-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7796-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7797-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7797-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7797-2 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7797-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7796-3 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7796-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7795-2 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7796-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0115-1 vom 2025-10-08",
"url": "https://ubuntu.com/security/notices/LSN-0115-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4328 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7796-4 vom 2025-10-13",
"url": "https://ubuntu.com/security/notices/USN-7796-4"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20663 vom 2025-10-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20663.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7819-1 vom 2025-10-13",
"url": "https://ubuntu.com/security/notices/USN-7819-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03663-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIBX7WDZXXXRTIUDX7WFS3VGPWD7NNCX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03671-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022929.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03671-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSB4TMSU4TOG6COW7K5C7QOAGBVGEEO2/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03636-1 vom 2025-10-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3675-1 vom 2025-10-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEX3OIACWJNL3JFTCKTDDY2ZAAD3HXJ5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3704-1 vom 2025-10-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H42YWEJO27NI2QHNED4NU6MIZAXTRDPY/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7819-2 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7819-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7832-1 vom 2025-10-21",
"url": "https://ubuntu.com/security/notices/USN-7832-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3721-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZXX3UCU5EV627AL7XTBESRPRFGBRMAK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3734-1 vom 2025-10-22",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3TOUYNINXLB53MUMC4YBDKDZIK7DGUF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7WMM33D7UTTQM25T2XCVZHFJKIMM3TO/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3742-1 vom 2025-10-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/022975.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20884-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20890-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20891-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20886-1 vom 2025-10-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7853-1 vom 2025-10-30",
"url": "https://ubuntu.com/security/notices/USN-7853-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7853-2 vom 2025-10-30",
"url": "https://ubuntu.com/security/notices/USN-7853-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20909-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20920-1 vom 2025-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-404 vom 2025-10-31",
"url": "https://www.dell.com/support/kbdoc/000385435"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7853-3 vom 2025-11-07",
"url": "https://ubuntu.com/security/notices/USN-7853-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7865-1 vom 2025-11-10",
"url": "https://ubuntu.com/security/notices/USN-7865-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21082 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21082"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:20518 vom 2025-11-11",
"url": "https://access.redhat.com/errata/RHSA-2025:20518"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-25757 vom 2025-11-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-25757.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21063 vom 2025-11-12",
"url": "https://access.redhat.com/errata/RHSA-2025:21063"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4123-1 vom 2025-11-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7875-1 vom 2025-11-19",
"url": "https://ubuntu.com/security/notices/USN-7875-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7874-1 vom 2025-11-19",
"url": "https://ubuntu.com/security/notices/USN-7874-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7874-2 vom 2025-11-19",
"url": "https://ubuntu.com/security/notices/USN-7874-2"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:20518 vom 2025-11-21",
"url": "https://errata.build.resf.org/RLSA-2025:20518"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20518 vom 2025-11-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-20518-0.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-1 vom 2025-12-03",
"url": "https://ubuntu.com/security/notices/USN-7907-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-2 vom 2025-12-03",
"url": "https://ubuntu.com/security/notices/USN-7907-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-2 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7909-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7909-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7910-1 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7910-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-4 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7907-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7907-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7874-3 vom 2025-12-04",
"url": "https://ubuntu.com/security/notices/USN-7874-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-1 vom 2025-12-10",
"url": "https://ubuntu.com/security/notices/USN-7922-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-3 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7928-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-1 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7928-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-2 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7922-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-2 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7928-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7907-5 vom 2025-12-12",
"url": "https://ubuntu.com/security/notices/USN-7907-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7939-2 vom 2025-12-17",
"url": "https://ubuntu.com/security/notices/USN-7939-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7939-1 vom 2025-12-17",
"url": "https://ubuntu.com/security/notices/USN-7939-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-21063 vom 2025-12-17",
"url": "https://linux.oracle.com/errata/ELSA-2025-21063.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7938-1 vom 2025-12-16",
"url": "https://ubuntu.com/security/notices/USN-7938-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-4 vom 2025-12-19",
"url": "https://ubuntu.com/security/notices/USN-7928-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-3 vom 2025-12-19",
"url": "https://ubuntu.com/security/notices/USN-7922-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-4 vom 2026-01-06",
"url": "https://ubuntu.com/security/notices/USN-7922-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7928-5 vom 2026-01-09",
"url": "https://ubuntu.com/security/notices/USN-7928-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7922-5 vom 2026-01-12",
"url": "https://ubuntu.com/security/notices/USN-7922-5"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-318 vom 2026-01-16",
"url": "https://www.dell.com/support/kbdoc/000359915"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50071 vom 2026-01-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-50071.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-1 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7988-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7987-2 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7987-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7987-1 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7987-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-2 vom 2026-01-30",
"url": "https://ubuntu.com/security/notices/USN-7988-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22910 vom 2026-01-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-22910.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-23947 vom 2026-01-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-23947.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-3 vom 2026-02-05",
"url": "https://ubuntu.com/security/notices/USN-7988-3"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6127 vom 2026-02-10",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-4 vom 2026-02-11",
"url": "https://ubuntu.com/security/notices/USN-7988-4"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4476 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7988-5 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-7988-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20324-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20326-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20291-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20325-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20323-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20292-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20294-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0755 vom 2026-02-18",
"url": "https://linux.oracle.com/errata/ELSA-2026-0755.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8070-2 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8070-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8070-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8070-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0118-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/LSN-0118-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8070-3 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8070-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1581 vom 2026-03-04",
"url": "https://linux.oracle.com/errata/ELSA-2026-1581.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4011 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4246 vom 2026-03-11",
"url": "https://access.redhat.com/errata/RHSA-2026:4246"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50145 vom 2026-03-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50145.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-1 vom 2026-03-16",
"url": "https://ubuntu.com/security/notices/USN-8098-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-1 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-2 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-2 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8098-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-4 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-3 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8107-1 vom 2026-03-18",
"url": "https://ubuntu.com/security/notices/USN-8107-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-3 vom 2026-03-18",
"url": "https://ubuntu.com/security/notices/USN-8098-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-1 vom 2026-03-20",
"url": "https://ubuntu.com/security/notices/USN-8112-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-2 vom 2026-03-20",
"url": "https://ubuntu.com/security/notices/USN-8112-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-5 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8096-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-4 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8098-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8116-1 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8116-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-3 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8112-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-4 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8112-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8112-5 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8112-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-6 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8098-6"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-5 vom 2026-03-24",
"url": "https://ubuntu.com/security/notices/USN-8098-5"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3685 vom 2026-03-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3685.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-8 vom 2026-03-25",
"url": "https://ubuntu.com/security/notices/USN-8098-8"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-7 vom 2026-03-25",
"url": "https://ubuntu.com/security/notices/USN-8098-7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8098-9 vom 2026-03-27",
"url": "https://ubuntu.com/security/notices/USN-8098-9"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50171 vom 2026-03-31",
"url": "https://oss.oracle.com/pipermail/el-errata/2026-March/020110.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8141-1 vom 2026-04-01",
"url": "https://ubuntu.com/security/notices/USN-8141-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8163-1 vom 2026-04-10",
"url": "https://ubuntu.com/security/notices/USN-8163-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8163-2 vom 2026-04-14",
"url": "https://ubuntu.com/security/notices/USN-8163-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8224-1 vom 2026-04-29",
"url": "https://ubuntu.com/security/notices/USN-8224-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6243 vom 2026-05-04",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00154.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4561 vom 2026-05-02",
"url": "https://lists.debian.org/debian-lts-announce/2026/05/msg00005.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8243-1 vom 2026-05-07",
"url": "https://ubuntu.com/security/notices/USN-8243-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8266-1 vom 2026-05-11",
"url": "https://ubuntu.com/security/notices/USN-8266-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8267-1 vom 2026-05-11",
"url": "https://ubuntu.com/security/notices/USN-8267-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50261 vom 2026-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50261.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8274-1 vom 2026-05-19",
"url": "https://ubuntu.com/security/notices/USN-8274-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8278-1 vom 2026-05-20",
"url": "https://ubuntu.com/security/notices/USN-8278-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8279-1 vom 2026-05-20",
"url": "https://ubuntu.com/security/notices/USN-8279-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8289-1 vom 2026-05-21",
"url": "https://ubuntu.com/security/notices/USN-8289-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2026-05-20T22:00:00.000+00:00",
"generator": {
"date": "2026-05-21T07:55:59.545+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.6.0"
}
},
"id": "WID-SEC-W-2024-3251",
"initial_release_date": "2024-10-21T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-21T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-17T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-24T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-11-25T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-28T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-02T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-09T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-12T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2024-12-22T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-01-02T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-01-07T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-01-15T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-01-16T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-19T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-20T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2025-01-27T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-28T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2025-02-03T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-04T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-05T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-09T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-02-10T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-11T23:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-17T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-19T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-24T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2025-02-27T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-03T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-04T23:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-05T23:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-03-06T23:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Oracle Linux und IBM aufgenommen"
},
{
"date": "2025-03-11T23:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-03-13T23:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-19T23:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-20T23:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-03-25T23:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-31T22:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-04-07T22:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-14T22:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-16T22:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-21T22:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-23T22:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-27T22:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-28T22:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-05T22:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-06T22:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-15T22:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-05-19T22:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-21T22:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-05-22T22:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von Ubuntu, SUSE und Debian aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von Ubuntu, Debian und Amazon aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-05T22:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "110",
"summary": "Neue Updates von Ubuntu, Amazon und SUSE aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "111",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "112",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-06-12T22:00:00.000+00:00",
"number": "113",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "114",
"summary": "Neue Updates von SUSE und NetApp aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "115",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "116",
"summary": "Neue Updates von Amazon und Ubuntu aufgenommen"
},
{
"date": "2025-06-26T22:00:00.000+00:00",
"number": "117",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "118",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "119",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-03T22:00:00.000+00:00",
"number": "120",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "121",
"summary": "Neue Updates von Oracle Linux, Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "122",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-13T22:00:00.000+00:00",
"number": "123",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-14T22:00:00.000+00:00",
"number": "124",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "125",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "126",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "127",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "128",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "129",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-23T22:00:00.000+00:00",
"number": "130",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-24T22:00:00.000+00:00",
"number": "131",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "132",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "133",
"summary": "Referenz(en) aufgenommen: EUVD-2025-22875"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "134",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "135",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "136",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "137",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "138",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-10T22:00:00.000+00:00",
"number": "139",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "140",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "141",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "142",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-20T22:00:00.000+00:00",
"number": "143",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "144",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "145",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "146",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "147",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "148",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "149",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "150",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2025-09-10T22:00:00.000+00:00",
"number": "151",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-11T22:00:00.000+00:00",
"number": "152",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "153",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "154",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "155",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-09-17T22:00:00.000+00:00",
"number": "156",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-09-18T22:00:00.000+00:00",
"number": "157",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-22T22:00:00.000+00:00",
"number": "158",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "159",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-24T22:00:00.000+00:00",
"number": "160",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-25T22:00:00.000+00:00",
"number": "161",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "162",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "163",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "164",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-08T22:00:00.000+00:00",
"number": "165",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "166",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "167",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "168",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-20T22:00:00.000+00:00",
"number": "169",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "170",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "171",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "172",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "173",
"summary": "Neue Updates von Ubuntu, SUSE und Dell aufgenommen"
},
{
"date": "2025-11-09T23:00:00.000+00:00",
"number": "174",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "175",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "176",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "177",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "178",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "179",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "180",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-04T23:00:00.000+00:00",
"number": "181",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "182",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-11T23:00:00.000+00:00",
"number": "183",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "184",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "185",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "186",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-12-21T23:00:00.000+00:00",
"number": "187",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-06T23:00:00.000+00:00",
"number": "188",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "189",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-12T23:00:00.000+00:00",
"number": "190",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-01-15T23:00:00.000+00:00",
"number": "191",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "192",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-29T23:00:00.000+00:00",
"number": "193",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "194",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "195",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "196",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "197",
"summary": "Neue Updates von Ubuntu und Debian aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "198",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "199",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "200",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "201",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-03T23:00:00.000+00:00",
"number": "202",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "203",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "204",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-10T23:00:00.000+00:00",
"number": "205",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "206",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "207",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "208",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "209",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "210",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "211",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "212",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "213",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-26T23:00:00.000+00:00",
"number": "214",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-31T22:00:00.000+00:00",
"number": "215",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-04-01T22:00:00.000+00:00",
"number": "216",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "217",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-04-13T22:00:00.000+00:00",
"number": "218",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-04-29T22:00:00.000+00:00",
"number": "219",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-05-03T22:00:00.000+00:00",
"number": "220",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-05-06T22:00:00.000+00:00",
"number": "221",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-05-11T22:00:00.000+00:00",
"number": "222",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-05-12T22:00:00.000+00:00",
"number": "223",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-05-18T22:00:00.000+00:00",
"number": "224",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-05-19T22:00:00.000+00:00",
"number": "225",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-05-20T22:00:00.000+00:00",
"number": "226",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "226"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T034583",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual"
}
}
},
{
"category": "product_version",
"name": "Virtual Edition",
"product": {
"name": "Dell NetWorker Virtual Edition",
"product_id": "T048226",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual_edition"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
"product_id": "T045879"
}
},
{
"category": "product_version",
"name": "8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.4.0.0",
"product_id": "T045879-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
"product_id": "T045881"
}
},
{
"category": "product_version",
"name": "7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.70",
"product_id": "T045881-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
"product_id": "T047343"
}
},
{
"category": "product_version",
"name": "7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.40",
"product_id": "T047343-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
"product_id": "T047344"
}
},
{
"category": "product_version",
"name": "8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.1.10",
"product_id": "T047344-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
}
}
}
],
"category": "product_name",
"name": "PowerProtect Data Domain"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.0.33",
"product": {
"name": "Dell PowerScale OneFS \u003c4.0.33",
"product_id": "T050048"
}
},
{
"category": "product_version",
"name": "4.0.33",
"product": {
"name": "Dell PowerScale OneFS 4.0.33",
"product_id": "T050048-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerscale_onefs:4.0.33"
}
}
}
],
"category": "product_name",
"name": "PowerScale OneFS"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11 IF02",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF02",
"product_id": "T041397"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11 IF02",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11 IF02",
"product_id": "T041397-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if02"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Kyocera Printer",
"product": {
"name": "Kyocera Printer",
"product_id": "T015471",
"product_identification_helper": {
"cpe": "cpe:/h:kyocera:printer:-"
}
}
}
],
"category": "vendor",
"name": "Kyocera"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Baseboard Management Controller",
"product": {
"name": "NetApp AFF Baseboard Management Controller",
"product_id": "T025086",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:aff:::baseboard_management_controller"
}
}
}
],
"category": "product_name",
"name": "AFF"
},
{
"branches": [
{
"category": "product_version",
"name": "for VMware vSphere",
"product": {
"name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
"product_id": "T025152",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
}
}
}
],
"category": "product_name",
"name": "ActiveIQ Unified Manager"
},
{
"branches": [
{
"category": "product_version",
"name": "Baseboard Management Controller",
"product": {
"name": "NetApp FAS Baseboard Management Controller",
"product_id": "T043535",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:baseboard_management_controller"
}
}
}
],
"category": "product_name",
"name": "FAS"
},
{
"category": "product_name",
"name": "NetApp StorageGRID",
"product": {
"name": "NetApp StorageGRID",
"product_id": "920206",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:storagegrid:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T046484",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T042774",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T042775",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager \u003c2025.2.1",
"product_id": "T044986"
}
},
{
"category": "product_version",
"name": "2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager 2025.2.1",
"product_id": "T044986-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10044",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2016-10044"
},
{
"cve": "CVE-2022-48946",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48946"
},
{
"cve": "CVE-2022-48947",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48947"
},
{
"cve": "CVE-2022-48948",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48948"
},
{
"cve": "CVE-2022-48949",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48949"
},
{
"cve": "CVE-2022-48950",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48950"
},
{
"cve": "CVE-2022-48951",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48951"
},
{
"cve": "CVE-2022-48952",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48952"
},
{
"cve": "CVE-2022-48953",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48953"
},
{
"cve": "CVE-2022-48954",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48954"
},
{
"cve": "CVE-2022-48955",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48955"
},
{
"cve": "CVE-2022-48956",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48956"
},
{
"cve": "CVE-2022-48957",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48957"
},
{
"cve": "CVE-2022-48958",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48958"
},
{
"cve": "CVE-2022-48959",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48959"
},
{
"cve": "CVE-2022-48960",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48960"
},
{
"cve": "CVE-2022-48961",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48961"
},
{
"cve": "CVE-2022-48962",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48962"
},
{
"cve": "CVE-2022-48963",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48963"
},
{
"cve": "CVE-2022-48964",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48964"
},
{
"cve": "CVE-2022-48965",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48965"
},
{
"cve": "CVE-2022-48966",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48966"
},
{
"cve": "CVE-2022-48967",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48967"
},
{
"cve": "CVE-2022-48968",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48968"
},
{
"cve": "CVE-2022-48969",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48969"
},
{
"cve": "CVE-2022-48970",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48970"
},
{
"cve": "CVE-2022-48971",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48971"
},
{
"cve": "CVE-2022-48972",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48972"
},
{
"cve": "CVE-2022-48973",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48973"
},
{
"cve": "CVE-2022-48974",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48974"
},
{
"cve": "CVE-2022-48975",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48975"
},
{
"cve": "CVE-2022-48976",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48976"
},
{
"cve": "CVE-2022-48977",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48977"
},
{
"cve": "CVE-2022-48978",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48978"
},
{
"cve": "CVE-2022-48979",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48979"
},
{
"cve": "CVE-2022-48980",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48980"
},
{
"cve": "CVE-2022-48981",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48981"
},
{
"cve": "CVE-2022-48982",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48982"
},
{
"cve": "CVE-2022-48983",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48983"
},
{
"cve": "CVE-2022-48984",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48984"
},
{
"cve": "CVE-2022-48985",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48985"
},
{
"cve": "CVE-2022-48986",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48986"
},
{
"cve": "CVE-2022-48987",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48987"
},
{
"cve": "CVE-2022-48988",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48988"
},
{
"cve": "CVE-2022-48989",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48989"
},
{
"cve": "CVE-2022-48990",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48990"
},
{
"cve": "CVE-2022-48991",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48991"
},
{
"cve": "CVE-2022-48992",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48992"
},
{
"cve": "CVE-2022-48993",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48993"
},
{
"cve": "CVE-2022-48994",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48994"
},
{
"cve": "CVE-2022-48995",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48995"
},
{
"cve": "CVE-2022-48996",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48996"
},
{
"cve": "CVE-2022-48997",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48997"
},
{
"cve": "CVE-2022-48998",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48998"
},
{
"cve": "CVE-2022-48999",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-48999"
},
{
"cve": "CVE-2022-49000",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49000"
},
{
"cve": "CVE-2022-49001",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49001"
},
{
"cve": "CVE-2022-49002",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49002"
},
{
"cve": "CVE-2022-49003",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49003"
},
{
"cve": "CVE-2022-49004",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49004"
},
{
"cve": "CVE-2022-49005",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49005"
},
{
"cve": "CVE-2022-49006",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49006"
},
{
"cve": "CVE-2022-49007",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49007"
},
{
"cve": "CVE-2022-49008",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49008"
},
{
"cve": "CVE-2022-49009",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49009"
},
{
"cve": "CVE-2022-49010",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49010"
},
{
"cve": "CVE-2022-49011",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49011"
},
{
"cve": "CVE-2022-49012",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49012"
},
{
"cve": "CVE-2022-49013",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49013"
},
{
"cve": "CVE-2022-49014",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49014"
},
{
"cve": "CVE-2022-49015",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49015"
},
{
"cve": "CVE-2022-49016",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49016"
},
{
"cve": "CVE-2022-49017",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49017"
},
{
"cve": "CVE-2022-49018",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49018"
},
{
"cve": "CVE-2022-49019",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49019"
},
{
"cve": "CVE-2022-49020",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49020"
},
{
"cve": "CVE-2022-49021",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49021"
},
{
"cve": "CVE-2022-49022",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49022"
},
{
"cve": "CVE-2022-49023",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49023"
},
{
"cve": "CVE-2022-49024",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49024"
},
{
"cve": "CVE-2022-49025",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49025"
},
{
"cve": "CVE-2022-49026",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49026"
},
{
"cve": "CVE-2022-49027",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49027"
},
{
"cve": "CVE-2022-49028",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49028"
},
{
"cve": "CVE-2022-49029",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49029"
},
{
"cve": "CVE-2022-49030",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49030"
},
{
"cve": "CVE-2022-49031",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49031"
},
{
"cve": "CVE-2022-49032",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49032"
},
{
"cve": "CVE-2022-49033",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2022-49033"
},
{
"cve": "CVE-2023-52917",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-52917"
},
{
"cve": "CVE-2023-52918",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-52918"
},
{
"cve": "CVE-2023-52919",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-52919"
},
{
"cve": "CVE-2023-6270",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2023-6270"
},
{
"cve": "CVE-2024-47675",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47675"
},
{
"cve": "CVE-2024-47676",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47676"
},
{
"cve": "CVE-2024-47677",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47677"
},
{
"cve": "CVE-2024-47678",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47678"
},
{
"cve": "CVE-2024-47679",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47679"
},
{
"cve": "CVE-2024-47680",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47680"
},
{
"cve": "CVE-2024-47681",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47681"
},
{
"cve": "CVE-2024-47682",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47682"
},
{
"cve": "CVE-2024-47683",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47683"
},
{
"cve": "CVE-2024-47684",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47684"
},
{
"cve": "CVE-2024-47685",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47685"
},
{
"cve": "CVE-2024-47686",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47686"
},
{
"cve": "CVE-2024-47687",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47687"
},
{
"cve": "CVE-2024-47688",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47688"
},
{
"cve": "CVE-2024-47689",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47689"
},
{
"cve": "CVE-2024-47690",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47690"
},
{
"cve": "CVE-2024-47691",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47691"
},
{
"cve": "CVE-2024-47692",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47692"
},
{
"cve": "CVE-2024-47693",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47693"
},
{
"cve": "CVE-2024-47694",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47694"
},
{
"cve": "CVE-2024-47695",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47695"
},
{
"cve": "CVE-2024-47696",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47696"
},
{
"cve": "CVE-2024-47697",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47697"
},
{
"cve": "CVE-2024-47698",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47698"
},
{
"cve": "CVE-2024-47699",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47699"
},
{
"cve": "CVE-2024-47700",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47700"
},
{
"cve": "CVE-2024-47701",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47701"
},
{
"cve": "CVE-2024-47702",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47702"
},
{
"cve": "CVE-2024-47703",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47703"
},
{
"cve": "CVE-2024-47704",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47704"
},
{
"cve": "CVE-2024-47705",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47705"
},
{
"cve": "CVE-2024-47706",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47706"
},
{
"cve": "CVE-2024-47707",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47707"
},
{
"cve": "CVE-2024-47708",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47708"
},
{
"cve": "CVE-2024-47709",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47709"
},
{
"cve": "CVE-2024-47710",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47710"
},
{
"cve": "CVE-2024-47711",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47711"
},
{
"cve": "CVE-2024-47712",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47712"
},
{
"cve": "CVE-2024-47713",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47713"
},
{
"cve": "CVE-2024-47714",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47714"
},
{
"cve": "CVE-2024-47715",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47715"
},
{
"cve": "CVE-2024-47716",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47716"
},
{
"cve": "CVE-2024-47717",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47717"
},
{
"cve": "CVE-2024-47718",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47718"
},
{
"cve": "CVE-2024-47719",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47719"
},
{
"cve": "CVE-2024-47720",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47720"
},
{
"cve": "CVE-2024-47721",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47721"
},
{
"cve": "CVE-2024-47722",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47722"
},
{
"cve": "CVE-2024-47723",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47723"
},
{
"cve": "CVE-2024-47724",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47724"
},
{
"cve": "CVE-2024-47725",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47725"
},
{
"cve": "CVE-2024-47726",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47726"
},
{
"cve": "CVE-2024-47727",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47727"
},
{
"cve": "CVE-2024-47728",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47728"
},
{
"cve": "CVE-2024-47729",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47729"
},
{
"cve": "CVE-2024-47730",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47730"
},
{
"cve": "CVE-2024-47731",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47731"
},
{
"cve": "CVE-2024-47732",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47732"
},
{
"cve": "CVE-2024-47733",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47733"
},
{
"cve": "CVE-2024-47734",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47734"
},
{
"cve": "CVE-2024-47735",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47735"
},
{
"cve": "CVE-2024-47736",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47736"
},
{
"cve": "CVE-2024-47737",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47737"
},
{
"cve": "CVE-2024-47738",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47738"
},
{
"cve": "CVE-2024-47739",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47739"
},
{
"cve": "CVE-2024-47740",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47740"
},
{
"cve": "CVE-2024-47741",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47741"
},
{
"cve": "CVE-2024-47742",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47742"
},
{
"cve": "CVE-2024-47743",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47743"
},
{
"cve": "CVE-2024-47744",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47744"
},
{
"cve": "CVE-2024-47745",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47745"
},
{
"cve": "CVE-2024-47746",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47746"
},
{
"cve": "CVE-2024-47747",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47747"
},
{
"cve": "CVE-2024-47748",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47748"
},
{
"cve": "CVE-2024-47749",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47749"
},
{
"cve": "CVE-2024-47750",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47750"
},
{
"cve": "CVE-2024-47751",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47751"
},
{
"cve": "CVE-2024-47752",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47752"
},
{
"cve": "CVE-2024-47753",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47753"
},
{
"cve": "CVE-2024-47754",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47754"
},
{
"cve": "CVE-2024-47755",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47755"
},
{
"cve": "CVE-2024-47756",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47756"
},
{
"cve": "CVE-2024-47757",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-47757"
},
{
"cve": "CVE-2024-49850",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49850"
},
{
"cve": "CVE-2024-49851",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49851"
},
{
"cve": "CVE-2024-49852",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49852"
},
{
"cve": "CVE-2024-49853",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49853"
},
{
"cve": "CVE-2024-49854",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49854"
},
{
"cve": "CVE-2024-49855",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49855"
},
{
"cve": "CVE-2024-49856",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49856"
},
{
"cve": "CVE-2024-49857",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49857"
},
{
"cve": "CVE-2024-49858",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49858"
},
{
"cve": "CVE-2024-49859",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49859"
},
{
"cve": "CVE-2024-49860",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49860"
},
{
"cve": "CVE-2024-49861",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49861"
},
{
"cve": "CVE-2024-49862",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49862"
},
{
"cve": "CVE-2024-49863",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49863"
},
{
"cve": "CVE-2024-49864",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49864"
},
{
"cve": "CVE-2024-49865",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49865"
},
{
"cve": "CVE-2024-49866",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49866"
},
{
"cve": "CVE-2024-49867",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49867"
},
{
"cve": "CVE-2024-49868",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49868"
},
{
"cve": "CVE-2024-49869",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49869"
},
{
"cve": "CVE-2024-49870",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49870"
},
{
"cve": "CVE-2024-49871",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49871"
},
{
"cve": "CVE-2024-49872",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49872"
},
{
"cve": "CVE-2024-49873",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49873"
},
{
"cve": "CVE-2024-49874",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49874"
},
{
"cve": "CVE-2024-49875",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49875"
},
{
"cve": "CVE-2024-49876",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49876"
},
{
"cve": "CVE-2024-49877",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49877"
},
{
"cve": "CVE-2024-49878",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49878"
},
{
"cve": "CVE-2024-49879",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49879"
},
{
"cve": "CVE-2024-49880",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49880"
},
{
"cve": "CVE-2024-49881",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49881"
},
{
"cve": "CVE-2024-49882",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49882"
},
{
"cve": "CVE-2024-49883",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49883"
},
{
"cve": "CVE-2024-49884",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49884"
},
{
"cve": "CVE-2024-49885",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49885"
},
{
"cve": "CVE-2024-49886",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49886"
},
{
"cve": "CVE-2024-49887",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49887"
},
{
"cve": "CVE-2024-49888",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49888"
},
{
"cve": "CVE-2024-49889",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49889"
},
{
"cve": "CVE-2024-49890",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49890"
},
{
"cve": "CVE-2024-49891",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49891"
},
{
"cve": "CVE-2024-49892",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49892"
},
{
"cve": "CVE-2024-49893",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49893"
},
{
"cve": "CVE-2024-49894",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49894"
},
{
"cve": "CVE-2024-49895",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49895"
},
{
"cve": "CVE-2024-49896",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49896"
},
{
"cve": "CVE-2024-49897",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49897"
},
{
"cve": "CVE-2024-49898",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49898"
},
{
"cve": "CVE-2024-49899",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49899"
},
{
"cve": "CVE-2024-49900",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49900"
},
{
"cve": "CVE-2024-49901",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49901"
},
{
"cve": "CVE-2024-49902",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49902"
},
{
"cve": "CVE-2024-49903",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49903"
},
{
"cve": "CVE-2024-49905",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49905"
},
{
"cve": "CVE-2024-49906",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49906"
},
{
"cve": "CVE-2024-49907",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49907"
},
{
"cve": "CVE-2024-49908",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49908"
},
{
"cve": "CVE-2024-49909",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49909"
},
{
"cve": "CVE-2024-49911",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49911"
},
{
"cve": "CVE-2024-49912",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49912"
},
{
"cve": "CVE-2024-49913",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49913"
},
{
"cve": "CVE-2024-49914",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49914"
},
{
"cve": "CVE-2024-49915",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49915"
},
{
"cve": "CVE-2024-49916",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49916"
},
{
"cve": "CVE-2024-49917",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49917"
},
{
"cve": "CVE-2024-49918",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49918"
},
{
"cve": "CVE-2024-49919",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49919"
},
{
"cve": "CVE-2024-49920",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49920"
},
{
"cve": "CVE-2024-49921",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49921"
},
{
"cve": "CVE-2024-49922",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49922"
},
{
"cve": "CVE-2024-49923",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49923"
},
{
"cve": "CVE-2024-49924",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49924"
},
{
"cve": "CVE-2024-49925",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49925"
},
{
"cve": "CVE-2024-49926",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49926"
},
{
"cve": "CVE-2024-49927",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49927"
},
{
"cve": "CVE-2024-49928",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49928"
},
{
"cve": "CVE-2024-49929",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49929"
},
{
"cve": "CVE-2024-49930",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49930"
},
{
"cve": "CVE-2024-49931",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49931"
},
{
"cve": "CVE-2024-49932",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49932"
},
{
"cve": "CVE-2024-49933",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49933"
},
{
"cve": "CVE-2024-49934",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49934"
},
{
"cve": "CVE-2024-49935",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49935"
},
{
"cve": "CVE-2024-49936",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49936"
},
{
"cve": "CVE-2024-49937",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49937"
},
{
"cve": "CVE-2024-49938",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49938"
},
{
"cve": "CVE-2024-49939",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49939"
},
{
"cve": "CVE-2024-49940",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49940"
},
{
"cve": "CVE-2024-49941",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49941"
},
{
"cve": "CVE-2024-49942",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49942"
},
{
"cve": "CVE-2024-49943",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49943"
},
{
"cve": "CVE-2024-49944",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49944"
},
{
"cve": "CVE-2024-49945",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49945"
},
{
"cve": "CVE-2024-49946",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49946"
},
{
"cve": "CVE-2024-49947",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49947"
},
{
"cve": "CVE-2024-49948",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49948"
},
{
"cve": "CVE-2024-49949",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49949"
},
{
"cve": "CVE-2024-49950",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49950"
},
{
"cve": "CVE-2024-49951",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49951"
},
{
"cve": "CVE-2024-49952",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49952"
},
{
"cve": "CVE-2024-49953",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49953"
},
{
"cve": "CVE-2024-49954",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49954"
},
{
"cve": "CVE-2024-49955",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49955"
},
{
"cve": "CVE-2024-49956",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49956"
},
{
"cve": "CVE-2024-49957",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49957"
},
{
"cve": "CVE-2024-49958",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49958"
},
{
"cve": "CVE-2024-49959",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49959"
},
{
"cve": "CVE-2024-49960",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49960"
},
{
"cve": "CVE-2024-49961",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49961"
},
{
"cve": "CVE-2024-49962",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49962"
},
{
"cve": "CVE-2024-49963",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49963"
},
{
"cve": "CVE-2024-49964",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49964"
},
{
"cve": "CVE-2024-49965",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49965"
},
{
"cve": "CVE-2024-49966",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49966"
},
{
"cve": "CVE-2024-49967",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49967"
},
{
"cve": "CVE-2024-49968",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49968"
},
{
"cve": "CVE-2024-49969",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49969"
},
{
"cve": "CVE-2024-49970",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49970"
},
{
"cve": "CVE-2024-49971",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49971"
},
{
"cve": "CVE-2024-49972",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49972"
},
{
"cve": "CVE-2024-49973",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49973"
},
{
"cve": "CVE-2024-49974",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49974"
},
{
"cve": "CVE-2024-49975",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49975"
},
{
"cve": "CVE-2024-49976",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49976"
},
{
"cve": "CVE-2024-49977",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49977"
},
{
"cve": "CVE-2024-49978",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49978"
},
{
"cve": "CVE-2024-49979",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49979"
},
{
"cve": "CVE-2024-49980",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49980"
},
{
"cve": "CVE-2024-49981",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49981"
},
{
"cve": "CVE-2024-49982",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49982"
},
{
"cve": "CVE-2024-49983",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49983"
},
{
"cve": "CVE-2024-49984",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49984"
},
{
"cve": "CVE-2024-49985",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49985"
},
{
"cve": "CVE-2024-49986",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49986"
},
{
"cve": "CVE-2024-49987",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49987"
},
{
"cve": "CVE-2024-49988",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49988"
},
{
"cve": "CVE-2024-49989",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49989"
},
{
"cve": "CVE-2024-49990",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49990"
},
{
"cve": "CVE-2024-49991",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49991"
},
{
"cve": "CVE-2024-49992",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49992"
},
{
"cve": "CVE-2024-49993",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49993"
},
{
"cve": "CVE-2024-49994",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49994"
},
{
"cve": "CVE-2024-49995",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49995"
},
{
"cve": "CVE-2024-49996",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49996"
},
{
"cve": "CVE-2024-49997",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49997"
},
{
"cve": "CVE-2024-49998",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49998"
},
{
"cve": "CVE-2024-49999",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-49999"
},
{
"cve": "CVE-2024-50000",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50000"
},
{
"cve": "CVE-2024-50001",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50001"
},
{
"cve": "CVE-2024-50002",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50002"
},
{
"cve": "CVE-2024-50003",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50003"
},
{
"cve": "CVE-2024-50004",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50004"
},
{
"cve": "CVE-2024-50005",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50005"
},
{
"cve": "CVE-2024-50006",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50006"
},
{
"cve": "CVE-2024-50007",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50007"
},
{
"cve": "CVE-2024-50008",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50008"
},
{
"cve": "CVE-2024-50009",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50009"
},
{
"cve": "CVE-2024-50010",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50010"
},
{
"cve": "CVE-2024-50011",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50011"
},
{
"cve": "CVE-2024-50012",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50012"
},
{
"cve": "CVE-2024-50013",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50013"
},
{
"cve": "CVE-2024-50014",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50014"
},
{
"cve": "CVE-2024-50015",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50015"
},
{
"cve": "CVE-2024-50016",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50016"
},
{
"cve": "CVE-2024-50017",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50017"
},
{
"cve": "CVE-2024-50018",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50018"
},
{
"cve": "CVE-2024-50019",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50019"
},
{
"cve": "CVE-2024-50020",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50020"
},
{
"cve": "CVE-2024-50021",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50021"
},
{
"cve": "CVE-2024-50022",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50022"
},
{
"cve": "CVE-2024-50023",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50023"
},
{
"cve": "CVE-2024-50024",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50024"
},
{
"cve": "CVE-2024-50025",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50025"
},
{
"cve": "CVE-2024-50026",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50026"
},
{
"cve": "CVE-2024-50027",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50027"
},
{
"cve": "CVE-2024-50028",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50028"
},
{
"cve": "CVE-2024-50029",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50029"
},
{
"cve": "CVE-2024-50030",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50030"
},
{
"cve": "CVE-2024-50031",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50031"
},
{
"cve": "CVE-2024-50032",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50032"
},
{
"cve": "CVE-2024-50033",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50033"
},
{
"cve": "CVE-2024-50034",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50034"
},
{
"cve": "CVE-2024-50035",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50035"
},
{
"cve": "CVE-2024-50036",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50036"
},
{
"cve": "CVE-2024-50037",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50037"
},
{
"cve": "CVE-2024-50038",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50038"
},
{
"cve": "CVE-2024-50039",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50039"
},
{
"cve": "CVE-2024-50040",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50040"
},
{
"cve": "CVE-2024-50041",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50041"
},
{
"cve": "CVE-2024-50042",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50042"
},
{
"cve": "CVE-2024-50043",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50043"
},
{
"cve": "CVE-2024-50044",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50044"
},
{
"cve": "CVE-2024-50045",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50045"
},
{
"cve": "CVE-2024-50046",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50046"
},
{
"cve": "CVE-2024-50047",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50047"
},
{
"cve": "CVE-2024-50048",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50048"
},
{
"cve": "CVE-2024-50049",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50049"
},
{
"cve": "CVE-2024-50055",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50055"
},
{
"cve": "CVE-2024-50056",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50056"
},
{
"cve": "CVE-2024-50057",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50057"
},
{
"cve": "CVE-2024-50058",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50058"
},
{
"cve": "CVE-2024-50059",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50059"
},
{
"cve": "CVE-2024-50060",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50060"
},
{
"cve": "CVE-2024-50061",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50061"
},
{
"cve": "CVE-2024-50062",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50062"
},
{
"cve": "CVE-2024-50063",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50063"
},
{
"cve": "CVE-2024-50064",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50064"
},
{
"cve": "CVE-2024-50065",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T004914",
"T042774",
"T042775",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T025086",
"T050048",
"T032255",
"T039664",
"T015471",
"T044986",
"2951",
"T002207",
"T043535",
"T045879",
"T000126",
"T027843",
"T046484",
"920206",
"1607324",
"T048226",
"T041397"
]
},
"release_date": "2024-10-21T22:00:00.000+00:00",
"title": "CVE-2024-50065"
}
]
}
WID-SEC-W-2025-2855
Vulnerability from csaf_certbund - Published: 2025-12-15 23:00 - Updated: 2025-12-15 23:00Summary
IBM DataPower Gateway: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Das DataPower Gateway ist eine Software zur Unterstützung von Unternehmen bei der Erfüllung der Sicherheits- und Integrationsanforderungen.
Angriff: Ein Angreifer kann mehrere Schwachstellen in IBM DataPower Gateway ausnutzen, um beliebigen Programmcode auszuführen, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder andere, nicht spezifizierte Angriffe durchzuführen.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
Affected products
Known affected
1 product
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
IBM DataPower Gateway <10.6.6.0
IBM / DataPower Gateway
|
<10.6.6.0 |
References
3 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das DataPower Gateway ist eine Software zur Unterst\u00fctzung von Unternehmen bei der Erf\u00fcllung der Sicherheits- und Integrationsanforderungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in IBM DataPower Gateway ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Daten zu manipulieren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder andere, nicht spezifizierte Angriffe durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2855 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2855.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2855 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2855"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7254810 vom 2025-12-15",
"url": "https://www.ibm.com/support/pages/node/7254810"
}
],
"source_lang": "en-US",
"title": "IBM DataPower Gateway: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-12-15T23:00:00.000+00:00",
"generator": {
"date": "2025-12-16T11:15:03.684+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2855",
"initial_release_date": "2025-12-15T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.6.6.0",
"product": {
"name": "IBM DataPower Gateway \u003c10.6.6.0",
"product_id": "T049457"
}
},
{
"category": "product_version",
"name": "10.6.6.0",
"product": {
"name": "IBM DataPower Gateway 10.6.6.0",
"product_id": "T049457-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:10.6.6.0"
}
}
}
],
"category": "product_name",
"name": "DataPower Gateway"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10044",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2016-10044"
},
{
"cve": "CVE-2024-39500",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-39500"
},
{
"cve": "CVE-2024-42265",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42265"
},
{
"cve": "CVE-2024-42291",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42291"
},
{
"cve": "CVE-2024-42294",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42294"
},
{
"cve": "CVE-2024-42304",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42304"
},
{
"cve": "CVE-2024-42312",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42312"
},
{
"cve": "CVE-2024-42316",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42316"
},
{
"cve": "CVE-2024-42321",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-42321"
},
{
"cve": "CVE-2024-43828",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-43828"
},
{
"cve": "CVE-2024-43846",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-43846"
},
{
"cve": "CVE-2024-43853",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-43853"
},
{
"cve": "CVE-2024-43871",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-43871"
},
{
"cve": "CVE-2024-43898",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-43898"
},
{
"cve": "CVE-2024-44958",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-44958"
},
{
"cve": "CVE-2024-44975",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-44975"
},
{
"cve": "CVE-2024-44987",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-44987"
},
{
"cve": "CVE-2024-44989",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-44989"
},
{
"cve": "CVE-2024-45022",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-45022"
},
{
"cve": "CVE-2024-46750",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-46750"
},
{
"cve": "CVE-2024-46787",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-46787"
},
{
"cve": "CVE-2024-47660",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47660"
},
{
"cve": "CVE-2024-47668",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47668"
},
{
"cve": "CVE-2024-47678",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47678"
},
{
"cve": "CVE-2024-47685",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47685"
},
{
"cve": "CVE-2024-47700",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47700"
},
{
"cve": "CVE-2024-47705",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47705"
},
{
"cve": "CVE-2024-47706",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47706"
},
{
"cve": "CVE-2024-47710",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47710"
},
{
"cve": "CVE-2024-47719",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47719"
},
{
"cve": "CVE-2024-47745",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-47745"
},
{
"cve": "CVE-2024-49851",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49851"
},
{
"cve": "CVE-2024-49860",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49860"
},
{
"cve": "CVE-2024-49870",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49870"
},
{
"cve": "CVE-2024-49875",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49875"
},
{
"cve": "CVE-2024-49881",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49881"
},
{
"cve": "CVE-2024-49882",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49882"
},
{
"cve": "CVE-2024-49883",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49883"
},
{
"cve": "CVE-2024-49884",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49884"
},
{
"cve": "CVE-2024-49885",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49885"
},
{
"cve": "CVE-2024-49886",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49886"
},
{
"cve": "CVE-2024-49889",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49889"
},
{
"cve": "CVE-2024-49927",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49927"
},
{
"cve": "CVE-2024-49933",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49933"
},
{
"cve": "CVE-2024-49935",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49935"
},
{
"cve": "CVE-2024-49954",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49954"
},
{
"cve": "CVE-2024-49959",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49959"
},
{
"cve": "CVE-2024-49960",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49960"
},
{
"cve": "CVE-2024-49962",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49962"
},
{
"cve": "CVE-2024-49968",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49968"
},
{
"cve": "CVE-2024-49975",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49975"
},
{
"cve": "CVE-2024-49983",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49983"
},
{
"cve": "CVE-2024-49994",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-49994"
},
{
"cve": "CVE-2024-50002",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50002"
},
{
"cve": "CVE-2024-50006",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50006"
},
{
"cve": "CVE-2024-50014",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50014"
},
{
"cve": "CVE-2024-50015",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50015"
},
{
"cve": "CVE-2024-50019",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50019"
},
{
"cve": "CVE-2024-50024",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50024"
},
{
"cve": "CVE-2024-50027",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50027"
},
{
"cve": "CVE-2024-50028",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50028"
},
{
"cve": "CVE-2024-50038",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50038"
},
{
"cve": "CVE-2024-50039",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50039"
},
{
"cve": "CVE-2024-50046",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50046"
},
{
"cve": "CVE-2024-50055",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50055"
},
{
"cve": "CVE-2024-50058",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50058"
},
{
"cve": "CVE-2024-50064",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50064"
},
{
"cve": "CVE-2024-50067",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50067"
},
{
"cve": "CVE-2024-50073",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50073"
},
{
"cve": "CVE-2024-50074",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50074"
},
{
"cve": "CVE-2024-50081",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50081"
},
{
"cve": "CVE-2024-50082",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50082"
},
{
"cve": "CVE-2024-50101",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50101"
},
{
"cve": "CVE-2024-50106",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50106"
},
{
"cve": "CVE-2024-50141",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50141"
},
{
"cve": "CVE-2024-50153",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50153"
},
{
"cve": "CVE-2024-50169",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50169"
},
{
"cve": "CVE-2024-50186",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50186"
},
{
"cve": "CVE-2024-50191",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50191"
},
{
"cve": "CVE-2024-50200",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50200"
},
{
"cve": "CVE-2024-50215",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50215"
},
{
"cve": "CVE-2024-50256",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50256"
},
{
"cve": "CVE-2024-50271",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50271"
},
{
"cve": "CVE-2024-50272",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50272"
},
{
"cve": "CVE-2024-50301",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-50301"
},
{
"cve": "CVE-2024-53044",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53044"
},
{
"cve": "CVE-2024-53057",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53057"
},
{
"cve": "CVE-2024-53070",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53070"
},
{
"cve": "CVE-2024-53082",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53082"
},
{
"cve": "CVE-2024-53085",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53085"
},
{
"cve": "CVE-2024-53096",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53096"
},
{
"cve": "CVE-2024-53097",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53097"
},
{
"cve": "CVE-2024-53103",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53103"
},
{
"cve": "CVE-2024-53105",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53105"
},
{
"cve": "CVE-2024-53110",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53110"
},
{
"cve": "CVE-2024-53117",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53117"
},
{
"cve": "CVE-2024-53118",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53118"
},
{
"cve": "CVE-2024-53124",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53124"
},
{
"cve": "CVE-2024-53136",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53136"
},
{
"cve": "CVE-2024-53142",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53142"
},
{
"cve": "CVE-2024-53160",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53160"
},
{
"cve": "CVE-2024-53166",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53166"
},
{
"cve": "CVE-2024-53173",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53173"
},
{
"cve": "CVE-2024-53174",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53174"
},
{
"cve": "CVE-2024-53203",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53203"
},
{
"cve": "CVE-2024-53222",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53222"
},
{
"cve": "CVE-2024-53681",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-53681"
},
{
"cve": "CVE-2024-56558",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56558"
},
{
"cve": "CVE-2024-56566",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56566"
},
{
"cve": "CVE-2024-56600",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56600"
},
{
"cve": "CVE-2024-56601",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56601"
},
{
"cve": "CVE-2024-56611",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56611"
},
{
"cve": "CVE-2024-56644",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56644"
},
{
"cve": "CVE-2024-56647",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56647"
},
{
"cve": "CVE-2024-56688",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56688"
},
{
"cve": "CVE-2024-56693",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56693"
},
{
"cve": "CVE-2024-56783",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-56783"
},
{
"cve": "CVE-2024-57843",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-57843"
},
{
"cve": "CVE-2024-57884",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-57884"
},
{
"cve": "CVE-2024-57888",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-57888"
},
{
"cve": "CVE-2024-57929",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2024-57929"
},
{
"cve": "CVE-2025-21666",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-21666"
},
{
"cve": "CVE-2025-21669",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-21669"
},
{
"cve": "CVE-2025-21694",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-21694"
},
{
"cve": "CVE-2025-21999",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-21999"
},
{
"cve": "CVE-2025-22058",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-22058"
},
{
"cve": "CVE-2025-22113",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-22113"
},
{
"cve": "CVE-2025-22121",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-22121"
},
{
"cve": "CVE-2025-37785",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-37785"
},
{
"cve": "CVE-2025-38089",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-38089"
},
{
"cve": "CVE-2025-38200",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-38200"
},
{
"cve": "CVE-2025-38461",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-38461"
},
{
"cve": "CVE-2025-8058",
"product_status": {
"known_affected": [
"T049457"
]
},
"release_date": "2025-12-15T23:00:00.000+00:00",
"title": "CVE-2025-8058"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…