Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-55039 (GCVE-0-2025-55039)
Vulnerability from cvelistv5 – Published: 2025-10-15 07:19 – Updated: 2025-11-04 21:13| URL | Tags |
|---|---|
| https://lists.apache.org/thread/zrgyy9l85nm2c7vk3… | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Apache Software Foundation | Apache Spark |
Affected:
3.5.0 , < 3.5.2
(semver)
Affected: 0 , < 3.4.4 (semver) |
|
| Apache Software Foundation | Apache Spark |
Affected:
3.5.0 , < 3.5.2
(semver)
Affected: 0 , < 3.4.4 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-55039",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-15T19:33:07.860034Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-15T19:33:31.064Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T21:13:00.940Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/10/14/11"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://repo.maven.apache.org/maven2",
"defaultStatus": "unaffected",
"packageName": "org.apache.spark:spark-network-common_2.13",
"product": "Apache Spark",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "3.5.2",
"status": "affected",
"version": "3.5.0",
"versionType": "semver"
},
{
"lessThan": "3.4.4",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://repo.maven.apache.org/maven2",
"defaultStatus": "unaffected",
"packageName": "org.apache.spark:spark-network-common_2.12",
"product": "Apache Spark",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "3.5.2",
"status": "affected",
"version": "3.5.0",
"versionType": "semver"
},
{
"lessThan": "3.4.4",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThis issue affects Apache Spark versions before 3.4.4,\u0026nbsp;3.5.2 and 4.0.0.\u003c/p\u003e\u003cp\u003e\u003c/p\u003eApache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.\u003cp\u003e\u003c/p\u003e\u003cp\u003eWhen \u003ccode\u003espark.network.crypto.enabled\u003c/code\u003e is set to true (it is set to false by default), but \u003ccode\u003espark.network.crypto.cipher\u003c/code\u003e is not explicitly configured, Spark defaults to AES in CTR mode (\u003ccode\u003eAES/CTR/NoPadding\u003c/code\u003e), which provides encryption without authentication.\u003c/p\u003e\u003cp\u003eThis vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eTo mitigate this issue, users should either configure \u003ccode\u003espark.network.crypto.cipher\u003c/code\u003e to \u003ccode\u003eAES/GCM/NoPadding\u003c/code\u003e to enable authenticated encryption or\u003c/p\u003e\u003cp\u003eenable SSL encryption by setting \u003ccode\u003espark.ssl.enabled\u003c/code\u003e to true, which provides stronger transport security.\u003c/p\u003e"
}
],
"value": "This issue affects Apache Spark versions before 3.4.4,\u00a03.5.2 and 4.0.0.\n\n\n\nApache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.\n\nWhen spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication.\n\nThis vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.\n\n\nTo mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or\n\nenable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security."
}
],
"metrics": [
{
"other": {
"content": {
"text": "moderate"
},
"type": "Textual description of severity"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "CWE-347 Improper Verification of Cryptographic Signature",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-326",
"description": "CWE-326 Inadequate Encryption Strength",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-15T07:19:25.493Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://lists.apache.org/thread/zrgyy9l85nm2c7vk36vr7bkyorg3w4qq"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Apache Spark, Apache Spark: RPC encryption defaults to unauthenticated AES-CTR mode, enabling man-in-the-middle ciphertext modification attacks",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2025-55039",
"datePublished": "2025-10-15T07:19:25.493Z",
"dateReserved": "2025-08-06T00:27:38.654Z",
"dateUpdated": "2025-11-04T21:13:00.940Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-55039",
"date": "2026-05-21",
"epss": "0.00099",
"percentile": "0.26787"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-55039\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-10-15T08:15:38.460\",\"lastModified\":\"2025-11-04T22:16:30.140\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"This issue affects Apache Spark versions before 3.4.4,\u00a03.5.2 and 4.0.0.\\n\\n\\n\\nApache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.\\n\\nWhen spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication.\\n\\nThis vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.\\n\\n\\nTo mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or\\n\\nenable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"},{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.4.4\",\"matchCriteriaId\":\"31BCFAC4-6096-41FE-82C7-2B1FEBBA485F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.0\",\"versionEndExcluding\":\"3.5.2\",\"matchCriteriaId\":\"C08715D5-2896-4CF9-8908-4780059E738F\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/zrgyy9l85nm2c7vk36vr7bkyorg3w4qq\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/10/14/11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/10/14/11\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T21:13:00.940Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-55039\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-15T19:33:07.860034Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-15T19:33:25.808Z\"}}], \"cna\": {\"title\": \"Apache Spark, Apache Spark: RPC encryption defaults to unauthenticated AES-CTR mode, enabling man-in-the-middle ciphertext modification attacks\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"moderate\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Spark\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.5.0\", \"lessThan\": \"3.5.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.4.4\", \"versionType\": \"semver\"}], \"packageName\": \"org.apache.spark:spark-network-common_2.13\", \"collectionURL\": \"https://repo.maven.apache.org/maven2\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Spark\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.5.0\", \"lessThan\": \"3.5.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.4.4\", \"versionType\": \"semver\"}], \"packageName\": \"org.apache.spark:spark-network-common_2.12\", \"collectionURL\": \"https://repo.maven.apache.org/maven2\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://lists.apache.org/thread/zrgyy9l85nm2c7vk36vr7bkyorg3w4qq\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"This issue affects Apache Spark versions before 3.4.4,\\u00a03.5.2 and 4.0.0.\\n\\n\\n\\nApache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.\\n\\nWhen spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication.\\n\\nThis vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.\\n\\n\\nTo mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or\\n\\nenable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eThis issue affects Apache Spark versions before 3.4.4,\u0026nbsp;3.5.2 and 4.0.0.\u003c/p\u003e\u003cp\u003e\u003c/p\u003eApache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.\u003cp\u003e\u003c/p\u003e\u003cp\u003eWhen \u003ccode\u003espark.network.crypto.enabled\u003c/code\u003e is set to true (it is set to false by default), but \u003ccode\u003espark.network.crypto.cipher\u003c/code\u003e is not explicitly configured, Spark defaults to AES in CTR mode (\u003ccode\u003eAES/CTR/NoPadding\u003c/code\u003e), which provides encryption without authentication.\u003c/p\u003e\u003cp\u003eThis vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eTo mitigate this issue, users should either configure \u003ccode\u003espark.network.crypto.cipher\u003c/code\u003e to \u003ccode\u003eAES/GCM/NoPadding\u003c/code\u003e to enable authenticated encryption or\u003c/p\u003e\u003cp\u003eenable SSL encryption by setting \u003ccode\u003espark.ssl.enabled\u003c/code\u003e to true, which provides stronger transport security.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-347\", \"description\": \"CWE-347 Improper Verification of Cryptographic Signature\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-326\", \"description\": \"CWE-326 Inadequate Encryption Strength\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2025-10-15T07:19:25.493Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-55039\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T21:13:00.940Z\", \"dateReserved\": \"2025-08-06T00:27:38.654Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2025-10-15T07:19:25.493Z\", \"assignerShortName\": \"apache\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CNVD-2025-25376
Vulnerability from cnvd - Published: 2025-10-24厂商已发布了漏洞修复程序,请及时关注更新: https://spark.apache.org/
| Name | ['Apache Apache Spark <3.4.4', 'Apache Apache Spark >=3.5.0,<3.5.2'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-55039",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-55039"
}
},
"description": "Apache Spark\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u652f\u6301\u975e\u5faa\u73af\u6570\u636e\u6d41\u548c\u5185\u5b58\u8ba1\u7b97\u7684\u5927\u89c4\u6a21\u6570\u636e\u5904\u7406\u5f15\u64ce\u3002\n\nApache Spark\u5b58\u5728\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4f7f\u7528\u4e0d\u5b89\u5168\u7684\u9ed8\u8ba4\u7f51\u7edc\u52a0\u5bc6\u5bc6\u7801\u8fdb\u884c\u8282\u70b9\u95f4RPC\u901a\u4fe1\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4e2d\u95f4\u4eba\u653b\u51fb\u4fee\u6539\u52a0\u5bc6RPC\u6d41\u91cf\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://spark.apache.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-25376",
"openTime": "2025-10-24",
"patchDescription": "Apache Spark\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u652f\u6301\u975e\u5faa\u73af\u6570\u636e\u6d41\u548c\u5185\u5b58\u8ba1\u7b97\u7684\u5927\u89c4\u6a21\u6570\u636e\u5904\u7406\u5f15\u64ce\u3002\r\n\r\nApache Spark\u5b58\u5728\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4f7f\u7528\u4e0d\u5b89\u5168\u7684\u9ed8\u8ba4\u7f51\u7edc\u52a0\u5bc6\u5bc6\u7801\u8fdb\u884c\u8282\u70b9\u95f4RPC\u901a\u4fe1\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4e2d\u95f4\u4eba\u653b\u51fb\u4fee\u6539\u52a0\u5bc6RPC\u6d41\u91cf\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apache Spark\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\uff08CNVD-2025-25376\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Apache Apache Spark \u003c3.4.4",
"Apache Apache Spark \u003e=3.5.0\uff0c\u003c3.5.2"
]
},
"referenceLink": "https://lists.apache.org/thread/zrgyy9l85nm2c7vk36vr7bkyorg3w4qq",
"serverity": "\u4e2d",
"submitTime": "2025-10-21",
"title": "Apache Spark\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\uff08CNVD-2025-25376\uff09"
}
FKIE_CVE-2025-55039
Vulnerability from fkie_nvd - Published: 2025-10-15 08:15 - Updated: 2025-11-04 22:16{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31BCFAC4-6096-41FE-82C7-2B1FEBBA485F",
"versionEndExcluding": "3.4.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:spark:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C08715D5-2896-4CF9-8908-4780059E738F",
"versionEndExcluding": "3.5.2",
"versionStartIncluding": "3.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue affects Apache Spark versions before 3.4.4,\u00a03.5.2 and 4.0.0.\n\n\n\nApache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.\n\nWhen spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication.\n\nThis vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.\n\n\nTo mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or\n\nenable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security."
}
],
"id": "CVE-2025-55039",
"lastModified": "2025-11-04T22:16:30.140",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-10-15T08:15:38.460",
"references": [
{
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread/zrgyy9l85nm2c7vk36vr7bkyorg3w4qq"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/10/14/11"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-326"
},
{
"lang": "en",
"value": "CWE-347"
}
],
"source": "security@apache.org",
"type": "Secondary"
}
]
}
GHSA-6P6V-M64V-JX8Q
Vulnerability from github – Published: 2025-10-15 09:30 – Updated: 2025-11-05 20:48This issue affects Apache Spark versions before 3.4.4, 3.5.2 and 4.0.0.
Apache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.
When spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication.
This vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.
To mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or enable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.spark:spark-network-common_2.13"
},
"ranges": [
{
"events": [
{
"introduced": "3.5.0"
},
{
"fixed": "3.5.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.spark:spark-network-common_2.13"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.4.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.spark:spark-network-common_2.12"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.4.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.spark:spark-network-common_2.12"
},
"ranges": [
{
"events": [
{
"introduced": "3.5.0"
},
{
"fixed": "3.5.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-55039"
],
"database_specific": {
"cwe_ids": [
"CWE-326"
],
"github_reviewed": true,
"github_reviewed_at": "2025-10-15T18:58:35Z",
"nvd_published_at": "2025-10-15T08:15:38Z",
"severity": "MODERATE"
},
"details": "This issue affects Apache Spark versions before 3.4.4,\u00a03.5.2 and 4.0.0.\n\nApache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.\n\nWhen spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication.\n\nThis vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.\n\nTo mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or enable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security.",
"id": "GHSA-6p6v-m64v-jx8q",
"modified": "2025-11-05T20:48:50Z",
"published": "2025-10-15T09:30:17Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55039"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/spark"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/zrgyy9l85nm2c7vk36vr7bkyorg3w4qq"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/10/14/11"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U",
"type": "CVSS_V4"
}
],
"summary": "Apache Spark has Inadequate Encryption Strength"
}
NCSC-2026-0021
Vulnerability from csaf_ncscnl - Published: 2026-01-21 09:19 - Updated: 2026-01-21 09:19Recent updates for Python 3 address multiple vulnerabilities, including denial of service risks in the tarfile module and HTML parsing, affecting various versions and leading to potential infinite loops and deadlocks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
Oracle Database Server versions 23.4.0-23.26.0 have a vulnerability in the Fleet Patching and Provisioning component, while Eclipse Jersey versions 2.45, 3.0.16, and 3.1.9 may ignore critical SSL configurations due to a race condition.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
Recent vulnerabilities in Oracle NoSQL Database and Apache Parquet allow for significant security risks, including arbitrary code execution and database compromise, affecting versions 1.5 and 1.6 of Oracle NoSQL and 1.15.0 and earlier of Apache Parquet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
Multiple vulnerabilities have been identified in Oracle WebLogic Server and Oracle Communications ASAP, both allowing unauthenticated partial denial of service, alongside an uncontrolled recursion issue in Apache Commons Lang leading to potential application crashes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
Oracle Fusion Middleware has a critical vulnerability (CVSS 9.8) allowing unauthenticated access, while OpenJPEG versions 2.5.1 to 2.5.3 contain a flaw leading to out-of-bounds heap memory writes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
Apache Spark versions prior to 4.0.0, 3.5.2, and 3.4.4 have a vulnerability due to insecure RPC encryption, while Oracle GoldenGate Stream Analytics versions 19.1.0.0.0-19.1.0.0.11 allow unauthorized data access.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
A vulnerability in Oracle GoldenGate's JDBC Driver for SQL Server (versions 21.3-21.20 and 23.4-23.10) allows unauthenticated attackers to exploit improper input validation, posing significant confidentiality and integrity risks with a CVSS score of 8.1.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
Netty's SMTP codec has a command injection vulnerability allowing email forgery, while Oracle GoldenGate Big Data and Application Adapters are susceptible to denial of service attacks by low-privileged users.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
Vulnerabilities in Oracle GraalVM for JDK and the GraalVM Multilingual Engine of Oracle Database Server allow unauthorized data access, with CVSS scores of 3.7 and 3.1, respectively.
CWE-862 - Missing Authorization| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
Apache Tomcat and Oracle Communications Unified Assurance have critical vulnerabilities related to Denial of Service (DoS) risks, affecting multiple versions and requiring updates to address issues like improper resource shutdown and HTTP access exploitation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
Recent vulnerabilities in Oracle Communications Unified Assurance and Apache HTTP Server versions 2.4.0 to 2.4.65 expose systems to unauthorized data manipulation, denial of service, and sensitive information disclosure through various exploitation methods.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
Multiple vulnerabilities in lz4-java (1.10.0 and earlier) and Oracle Essbase (21.8.0.0.0) allow unauthorized access and sensitive data disclosure due to insufficient buffer clearing and unauthenticated access, respectively.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
The `io.netty.handler.codec.http.HttpRequestEncoder` is vulnerable to CRLF injection in the request URI, leading to request smuggling, while the Oracle Graal Development Kit for Micronaut has an exploitable vulnerability affecting specific versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
Apache Log4j Core versions 2.0-beta9 to 2.25.2 lack TLS hostname verification in the Socket Appender, while Oracle's Primavera Gateway has a vulnerability allowing unauthenticated access via TLS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
A vulnerability in Oracle APEX Sample Applications allows low-privileged attackers to compromise applications, leading to unauthorized data access and modifications across several supported versions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
A vulnerability in Oracle Database Server's SQLcl component (versions 23.4.0-23.26.0) allows unauthenticated attackers to compromise SQLcl with human interaction, rated with a CVSS 3.1 Base Score of 7.0.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
A vulnerability in the Java VM component of Oracle Database Server versions 19.3-19.29 and 21.3-21.20 allows high-privileged authenticated users to potentially cause a denial of service, with a CVSS score of 4.5.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
A vulnerability in Oracle Zero Data Loss Recovery Appliance Software (versions 23.1.0-23.1.202509) allows unauthenticated attackers to potentially gain unauthorized read access to data, with a CVSS score of 3.1.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:unknown/*
Oracle / Core RDBMS
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Essbase
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Fleet Patching and Provisioning
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GoldenGate Big Data and Application Adapters
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Goldengate Stream Analytics
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / GraalVM
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Graph Server And Client
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Java Virtual Machine
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / NoSQL Database
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle APEX Sample Applications
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Database Server
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Graal Development Kit for Micronaut
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Oracle Zero Data Loss Recovery Appliance Software
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / SQLcl
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Secure Backup
|
vers:unknown/* | ||
|
vers:unknown/*
Oracle / Spatial and Graph
|
vers:unknown/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in Oracle Database Server producten.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in Oracle Database Server stellen niet-geauthenticeerde aanvallers in staat om de integriteit en vertrouwelijkheid van gegevens te compromitteren. Dit kan leiden tot ongeautoriseerde toegang tot gevoelige data en zelfs een mogelijke overname van de SQLcl-component. ",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "general",
"text": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"title": "CWE-93"
},
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Use of Uninitialized Variable",
"title": "CWE-457"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://www.oracle.com/security-alerts/cpujan2026.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Database Server producten",
"tracking": {
"current_release_date": "2026-01-21T09:19:00.000449Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0021",
"initial_release_date": "2026-01-21T09:19:00.000449Z",
"revision_history": [
{
"date": "2026-01-21T09:19:00.000449Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Core RDBMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Essbase"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Fleet Patching and Provisioning"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "GoldenGate"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "GoldenGate Big Data and Application Adapters"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "Goldengate Stream Analytics"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "GraalVM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "Graph Server And Client"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "Java Virtual Machine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "NoSQL Database"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "Oracle APEX Sample Applications"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "Oracle Database Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "Oracle Graal Development Kit for Micronaut"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "Oracle Zero Data Loss Recovery Appliance Software"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "SQLcl"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "Secure Backup"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "Spatial and Graph"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-8194",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Recent updates for Python 3 address multiple vulnerabilities, including denial of service risks in the tarfile module and HTML parsing, affecting various versions and leading to potential infinite loops and deadlocks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8194 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8194.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-8194"
},
{
"cve": "CVE-2025-12383",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Oracle Database Server versions 23.4.0-23.26.0 have a vulnerability in the Fleet Patching and Provisioning component, while Eclipse Jersey versions 2.45, 3.0.16, and 3.1.9 may ignore critical SSL configurations due to a race condition.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-12383 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-12383.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-12383"
},
{
"cve": "CVE-2025-30065",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle NoSQL Database and Apache Parquet allow for significant security risks, including arbitrary code execution and database compromise, affecting versions 1.5 and 1.6 of Oracle NoSQL and 1.15.0 and earlier of Apache Parquet.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30065 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-30065.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-30065"
},
{
"cve": "CVE-2025-48924",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle WebLogic Server and Oracle Communications ASAP, both allowing unauthenticated partial denial of service, alongside an uncontrolled recursion issue in Apache Commons Lang leading to potential application crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-48924"
},
{
"cve": "CVE-2025-54874",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Variable",
"title": "CWE-457"
},
{
"category": "description",
"text": "Oracle Fusion Middleware has a critical vulnerability (CVSS 9.8) allowing unauthenticated access, while OpenJPEG versions 2.5.1 to 2.5.3 contain a flaw leading to out-of-bounds heap memory writes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-54874 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-54874.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-54874"
},
{
"cve": "CVE-2025-55039",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Spark versions prior to 4.0.0, 3.5.2, and 3.4.4 have a vulnerability due to insecure RPC encryption, while Oracle GoldenGate Stream Analytics versions 19.1.0.0.0-19.1.0.0.11 allow unauthorized data access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55039 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55039.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-55039"
},
{
"cve": "CVE-2025-59250",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "A vulnerability in Oracle GoldenGate\u0027s JDBC Driver for SQL Server (versions 21.3-21.20 and 23.4-23.10) allows unauthenticated attackers to exploit improper input validation, posing significant confidentiality and integrity risks with a CVSS score of 8.1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59250 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59250.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-59250"
},
{
"cve": "CVE-2025-59419",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"title": "CWE-93"
},
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"title": "CWE-78"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Netty\u0027s SMTP codec has a command injection vulnerability allowing email forgery, while Oracle GoldenGate Big Data and Application Adapters are susceptible to denial of service attacks by low-privileged users.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59419 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59419.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-59419"
},
{
"cve": "CVE-2025-61755",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "description",
"text": "Vulnerabilities in Oracle GraalVM for JDK and the GraalVM Multilingual Engine of Oracle Database Server allow unauthorized data access, with CVSS scores of 3.7 and 3.1, respectively.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61755 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61755.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-61755"
},
{
"cve": "CVE-2025-61795",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Tomcat and Oracle Communications Unified Assurance have critical vulnerabilities related to Denial of Service (DoS) risks, affecting multiple versions and requiring updates to address issues like improper resource shutdown and HTTP access exploitation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-61795 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-61795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-61795"
},
{
"cve": "CVE-2025-65082",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Assurance and Apache HTTP Server versions 2.4.0 to 2.4.65 expose systems to unauthorized data manipulation, denial of service, and sensitive information disclosure through various exploitation methods.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-65082 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-65082.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-65082"
},
{
"cve": "CVE-2025-66566",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "description",
"text": "Multiple vulnerabilities in lz4-java (1.10.0 and earlier) and Oracle Essbase (21.8.0.0.0) allow unauthorized access and sensitive data disclosure due to insufficient buffer clearing and unauthenticated access, respectively.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-66566 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-66566.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-66566"
},
{
"cve": "CVE-2025-67735",
"cwe": {
"id": "CWE-93",
"name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)",
"title": "CWE-93"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "The `io.netty.handler.codec.http.HttpRequestEncoder` is vulnerable to CRLF injection in the request URI, leading to request smuggling, while the Oracle Graal Development Kit for Micronaut has an exploitable vulnerability affecting specific versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-67735 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-67735.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-67735"
},
{
"cve": "CVE-2025-68161",
"cwe": {
"id": "CWE-297",
"name": "Improper Validation of Certificate with Host Mismatch"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Certificate with Host Mismatch",
"title": "CWE-297"
},
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Apache Log4j Core versions 2.0-beta9 to 2.25.2 lack TLS hostname verification in the Socket Appender, while Oracle\u0027s Primavera Gateway has a vulnerability allowing unauthenticated access via TLS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-68161 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-68161.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2025-68161"
},
{
"cve": "CVE-2026-21931",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle APEX Sample Applications allows low-privileged attackers to compromise applications, leading to unauthorized data access and modifications across several supported versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21931 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21931.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-21931"
},
{
"cve": "CVE-2026-21939",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle Database Server\u0027s SQLcl component (versions 23.4.0-23.26.0) allows unauthenticated attackers to compromise SQLcl with human interaction, rated with a CVSS 3.1 Base Score of 7.0.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21939 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21939.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-21939"
},
{
"cve": "CVE-2026-21975",
"notes": [
{
"category": "description",
"text": "A vulnerability in the Java VM component of Oracle Database Server versions 19.3-19.29 and 21.3-21.20 allows high-privileged authenticated users to potentially cause a denial of service, with a CVSS score of 4.5.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21975 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-21975"
},
{
"cve": "CVE-2026-21977",
"notes": [
{
"category": "description",
"text": "A vulnerability in Oracle Zero Data Loss Recovery Appliance Software (versions 23.1.0-23.1.202509) allows unauthenticated attackers to potentially gain unauthorized read access to data, with a CVSS score of 3.1.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-21977 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-21977.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17"
]
}
],
"title": "CVE-2026-21977"
}
]
}
PYSEC-2025-184
Vulnerability from pysec - Published: 2025-10-15 08:15 - Updated: 2026-05-20 09:19This issue affects Apache Spark versions before 3.4.4, 3.5.2 and 4.0.0.
Apache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.
When spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication.
This vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.
To mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or
enable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security.
| Name | purl | pyspark | pkg:pypi/pyspark |
|---|
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "pyspark",
"purl": "pkg:pypi/pyspark"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.4.4"
},
{
"introduced": "3.5.0"
},
{
"fixed": "3.5.2"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"2.1.1",
"2.1.2",
"2.1.3",
"2.2.0",
"2.2.1",
"2.2.2",
"2.2.3",
"2.3.0",
"2.3.1",
"2.3.2",
"2.3.3",
"2.3.4",
"2.4.0",
"2.4.1",
"2.4.2",
"2.4.3",
"2.4.4",
"2.4.5",
"2.4.6",
"2.4.7",
"2.4.8",
"3.0.0",
"3.0.1",
"3.0.2",
"3.0.3",
"3.1.1",
"3.1.2",
"3.1.3",
"3.2.0",
"3.2.1",
"3.2.2",
"3.2.3",
"3.2.4",
"3.3.0",
"3.3.1",
"3.3.2",
"3.3.3",
"3.3.4",
"3.4.0",
"3.4.1",
"3.4.2",
"3.4.3",
"3.5.0",
"3.5.1"
]
}
],
"aliases": [
"CVE-2025-55039"
],
"details": "This issue affects Apache Spark versions before 3.4.4,\u00a03.5.2 and 4.0.0.\n\n\n\nApache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes.\n\nWhen spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly configured, Spark defaults to AES in CTR mode (AES/CTR/NoPadding), which provides encryption without authentication.\n\nThis vulnerability allows a man-in-the-middle attacker to modify encrypted RPC traffic undetected by flipping bits in ciphertext, potentially compromising heartbeat messages or application data and affecting the integrity of Spark workflows.\n\n\nTo mitigate this issue, users should either configure spark.network.crypto.cipher to AES/GCM/NoPadding to enable authenticated encryption or\n\nenable SSL encryption by setting spark.ssl.enabled to true, which provides stronger transport security.",
"id": "PYSEC-2025-184",
"modified": "2026-05-20T09:19:16.191100Z",
"published": "2025-10-15T08:15:38.460Z",
"references": [
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/10/14/11"
},
{
"type": "ADVISORY",
"url": "https://lists.apache.org/thread/zrgyy9l85nm2c7vk36vr7bkyorg3w4qq"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.