WID-SEC-W-2025-2365
Vulnerability from csaf_certbund - Published: 2025-10-21 22:00 - Updated: 2025-12-01 23:00Summary
Oracle Java SE: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- Windows
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2365 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2365.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2365 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2365"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2025 - Appendix Oracle Java SE vom 2025-10-21",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html#AppendixJAVA"
},
{
"category": "external",
"summary": "Change Log for Amazon Corretto 11",
"url": "https://github.com/corretto/corretto-11/blob/11.0.29.7.1/CHANGELOG.md"
},
{
"category": "external",
"summary": "Change Log for Amazon Corretto 8",
"url": "https://github.com/corretto/corretto-8/blob/8.472.08.1/CHANGELOG.md"
},
{
"category": "external",
"summary": "OpenJDK Vulnerability Advisory vom 2025-10-21",
"url": "https://openjdk.org/groups/vulnerability/advisories/2025-10-21"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18824 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18824"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18822 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18822"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18823 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18823"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18816 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18816"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18814 vom 2025-10-23",
"url": "https://access.redhat.com/errata/RHSA-2025:18814"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18825 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18825"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18826 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18826"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18817 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18817"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18821 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18821"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18820 vom 2025-10-23",
"url": "https://access.redhat.com/errata/RHSA-2025:18820"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18819 vom 2025-10-23",
"url": "https://access.redhat.com/errata/RHSA-2025:18819"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18818 vom 2025-10-24",
"url": "https://access.redhat.com/errata/RHSA-2025:18818"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18815 vom 2025-10-23",
"url": "https://access.redhat.com/errata/RHSA-2025:18815"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15660-1 vom 2025-10-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYBJ677VF7F4ZSMLX3GWAMXWMZMDX6TI/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4346 vom 2025-10-25",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00026.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4345 vom 2025-10-25",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00025.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6039 vom 2025-10-26",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00205.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15661-1 vom 2025-10-24",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5UPJO4CYYCTTODVMA4476F3K2Z7WPTBS/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6037 vom 2025-10-25",
"url": "https://security-tracker.debian.org/tracker/DSA-6037-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-18824 vom 2025-10-24",
"url": "https://linux.oracle.com/errata/ELSA-2025-18824.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20251024-0010 vom 2025-10-24",
"url": "https://security.netapp.com/advisory/NTAP-20251024-0010"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6038 vom 2025-10-25",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00204.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-18821 vom 2025-10-24",
"url": "https://linux.oracle.com/errata/ELSA-2025-18821.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-18815 vom 2025-10-24",
"url": "https://linux.oracle.com/errata/ELSA-2025-18815.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3047 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3047.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3048 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3048.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2025-021 vom 2025-10-27",
"url": "https://alas.aws.amazon.com/AL2/ALAS2CORRETTO8-2025-021.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3835-1 vom 2025-10-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3859-1 vom 2025-10-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-October/023079.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15674-1 vom 2025-10-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4MJYY6GI4OEPCONZ5OZF6JPBI67LCPJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3859-1 vom 2025-10-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMV65UKEMJ5XZGXBOOCVPAPP6DHKNBG5/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15693-1 vom 2025-11-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VU4T2GSGJ3FSMB2VQKU2AVIH5DSZ4Q7A/"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7249833 vom 2025-10-31",
"url": "https://www.ibm.com/support/pages/node/7249833"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15690-1 vom 2025-11-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBTHACNEISJLEVENW6F2UY73GMJFQAPI/"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7249834 vom 2025-10-31",
"url": "https://www.ibm.com/support/pages/node/7249834"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15694-1 vom 2025-11-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPNAG4GRUDNAT2AVXYGLMZTAD2X5TWNZ/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15691-1 vom 2025-11-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BPFSP3HIULFUYTXM7EZVSJGRCVQF2ANT/"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7250035 vom 2025-11-03",
"url": "https://www.ibm.com/support/pages/node/7250035"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7250255 vom 2025-11-06",
"url": "https://www.ibm.com/support/pages/node/7250255"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15701-1 vom 2025-11-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NYSZB3IXIAPQGFBTRTYOPOEOZDCFYMRH/"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7250250 vom 2025-11-06",
"url": "https://www.ibm.com/support/pages/node/7250250"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3964-1 vom 2025-11-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023167.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3965-1 vom 2025-11-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023166.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3996-1 vom 2025-11-07",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4XBO3CFLQHMPIGKNMQNDBIDRQ6ZRN6U/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:3997-1 vom 2025-11-07",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P6MDCNVOO2ZGEPCYBSDNBOEOJK3N37FG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4005-1 vom 2025-11-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRGDIRMJ63CBCCXYFXZ434NAYMNERVTW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4005-1 vom 2025-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023183.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4039-1 vom 2025-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023195.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3072 vom 2025-11-11",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3072.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4038-1 vom 2025-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023196.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-18814 vom 2025-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-18814.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:21485 vom 2025-11-17",
"url": "https://access.redhat.com/errata/RHSA-2025:21485"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-018 vom 2025-11-18",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/11/Xerox-Security-Bulletin-XRX25-018-Xerox-FreeFlow-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7251920 vom 2025-11-19",
"url": "https://www.ibm.com/support/pages/node/7251920"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:21485 vom 2025-11-25",
"url": "https://errata.build.resf.org/RLSA-2025:21485"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7884-1 vom 2025-11-25",
"url": "https://ubuntu.com/security/notices/USN-7884-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7885-1 vom 2025-11-25",
"url": "https://ubuntu.com/security/notices/USN-7885-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22088 vom 2025-11-25",
"url": "https://access.redhat.com/errata/RHSA-2025:22088"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7252217 vom 2025-11-25",
"url": "https://www.ibm.com/support/pages/node/7252217"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7883-1 vom 2025-11-25",
"url": "https://ubuntu.com/security/notices/USN-7883-1"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2025-132 vom 2025-11-26",
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2025-132/index.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7882-1 vom 2025-11-25",
"url": "https://ubuntu.com/security/notices/USN-7882-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7252680 vom 2025-11-26",
"url": "https://www.ibm.com/support/pages/node/7252680"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7252724 vom 2025-11-26",
"url": "https://www.ibm.com/support/pages/node/7252724"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4287-1 vom 2025-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023427.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22370 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22370"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-438 vom 2025-12-01",
"url": "https://www.dell.com/support/kbdoc/de-de/000397455/dsa-2025-438-security-update-for-dell-networker-runtime-environment-multiple-third-party-component-vulnerabilities"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7253241 vom 2025-12-01",
"url": "https://www.ibm.com/support/pages/node/7253241"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7901-1 vom 2025-12-02",
"url": "https://ubuntu.com/security/notices/USN-7901-1"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20123-1 vom 2025-12-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GQWF5TZM5GYGLQPAY4CY63R5SDNNGIHF/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025-20125-1 vom 2025-12-01",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSTB5CP5PLTZBCEI7BMNC646ZLF732WB/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7902-1 vom 2025-12-02",
"url": "https://ubuntu.com/security/notices/USN-7902-1"
},
{
"category": "external",
"summary": "Camunda Security Notices vom 2025-12-01",
"url": "https://docs.camunda.org/security/notices/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7900-1 vom 2025-12-02",
"url": "https://ubuntu.com/security/notices/USN-7900-1"
}
],
"source_lang": "en-US",
"title": "Oracle Java SE: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-12-01T23:00:00.000+00:00",
"generator": {
"date": "2025-12-02T07:58:38.087+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2365",
"initial_release_date": "2025-10-21T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-10-22T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat und European Union Vulnerability Database aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-26T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von openSUSE, Debian, Oracle Linux und NetApp aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-29T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2025-11-02T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von openSUSE, IBM und IBM-APAR aufgenommen"
},
{
"date": "2025-11-03T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-11-05T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von IBM und openSUSE aufgenommen"
},
{
"date": "2025-11-06T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-09T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-11-10T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-11-16T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat, IBM, Ubuntu und HITACHI aufgenommen"
},
{
"date": "2025-11-26T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-01T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Ubuntu und openSUSE aufgenommen"
}
],
"status": "final",
"version": "22"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.472.08.1",
"product": {
"name": "Amazon Corretto \u003c8.472.08.1",
"product_id": "T048031"
}
},
{
"category": "product_version",
"name": "8.472.08.1",
"product": {
"name": "Amazon Corretto 8.472.08.1",
"product_id": "T048031-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:amazon:corretto:8.472.08.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.0.29.7.1",
"product": {
"name": "Amazon Corretto \u003c11.0.29.7.1",
"product_id": "T048032"
}
},
{
"category": "product_version",
"name": "11.0.29.7.1",
"product": {
"name": "Amazon Corretto 11.0.29.7.1",
"product_id": "T048032-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:amazon:corretto:11.0.29.7.1"
}
}
}
],
"category": "product_name",
"name": "Corretto"
},
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Runtime Environment \u003c17.0.3",
"product": {
"name": "Dell NetWorker Runtime Environment \u003c17.0.3",
"product_id": "T048963"
}
},
{
"category": "product_version",
"name": "Runtime Environment 17.0.3",
"product": {
"name": "Dell NetWorker Runtime Environment 17.0.3",
"product_id": "T048963-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:runtime_environment__17.0.3"
}
}
},
{
"category": "product_version_range",
"name": "Runtime Environment \u003c8.0.27",
"product": {
"name": "Dell NetWorker Runtime Environment \u003c8.0.27",
"product_id": "T048964"
}
},
{
"category": "product_version",
"name": "Runtime Environment 8.0.27",
"product": {
"name": "Dell NetWorker Runtime Environment 8.0.27",
"product_id": "T048964-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:runtime_environment__8.0.27"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Command Suite",
"product": {
"name": "Hitachi Command Suite",
"product_id": "T038839",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:command_suite:-"
}
}
},
{
"category": "product_name",
"name": "Hitachi Configuration Manager",
"product": {
"name": "Hitachi Configuration Manager",
"product_id": "T020304",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:configuration_manager:-"
}
}
},
{
"category": "product_name",
"name": "Hitachi Ops Center",
"product": {
"name": "Hitachi Ops Center",
"product_id": "T038840",
"product_identification_helper": {
"cpe": "cpe:/a:hitachi:ops_center:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM App Connect Enterprise",
"product": {
"name": "IBM App Connect Enterprise",
"product_id": "T032495",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:-"
}
}
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow",
"product": {
"name": "IBM Business Automation Workflow",
"product_id": "T019704",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:-"
}
}
},
{
"category": "product_name",
"name": "IBM Integration Bus",
"product": {
"name": "IBM Integration Bus",
"product_id": "T011169",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:integration_bus:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.1.5.28",
"product": {
"name": "IBM Java \u003c7.1.5.28",
"product_id": "T048247"
}
},
{
"category": "product_version",
"name": "7.1.5.28",
"product": {
"name": "IBM Java 7.1.5.28",
"product_id": "T048247-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:jre:7.1.5.28"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.0.8.55",
"product": {
"name": "IBM Java \u003c8.0.8.55",
"product_id": "T048248"
}
},
{
"category": "product_version",
"name": "8.0.8.55",
"product": {
"name": "IBM Java 8.0.8.55",
"product_id": "T048248-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:jre:8.0.8.55"
}
}
}
],
"category": "product_name",
"name": "Java"
},
{
"category": "product_name",
"name": "IBM Semeru Runtime",
"product": {
"name": "IBM Semeru Runtime",
"product_id": "T048255",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:semeru_runtime:-"
}
}
},
{
"category": "product_name",
"name": "IBM Tivoli Key Lifecycle Manager",
"product": {
"name": "IBM Tivoli Key Lifecycle Manager",
"product_id": "T026238",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_key_lifecycle_manager:-"
}
}
},
{
"category": "product_name",
"name": "IBM Tivoli Monitoring",
"product": {
"name": "IBM Tivoli Monitoring",
"product_id": "T011128",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_monitoring:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "8.1.0",
"product": {
"name": "IBM Tivoli Netcool/OMNIbus 8.1.0",
"product_id": "T048745",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_netcool%2fomnibus:8.1.0"
}
}
}
],
"category": "product_name",
"name": "Tivoli Netcool/OMNIbus"
},
{
"branches": [
{
"category": "product_version",
"name": "8.5",
"product": {
"name": "IBM WebSphere Application Server 8.5",
"product_id": "703851",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:websphere_application_server:8.5"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "IBM WebSphere Application Server 9.0",
"product_id": "703852",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:websphere_application_server:9.0"
}
}
},
{
"category": "product_version",
"name": "liberty",
"product": {
"name": "IBM WebSphere Application Server liberty",
"product_id": "T008337",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:websphere_application_server:liberty"
}
}
}
],
"category": "product_name",
"name": "WebSphere Application Server"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T037607",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.24.1",
"product": {
"name": "Open Source Camunda \u003c7.24.1",
"product_id": "T048978"
}
},
{
"category": "product_version",
"name": "7.24.1",
"product": {
"name": "Open Source Camunda 7.24.1",
"product_id": "T048978-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:camunda:camunda:7.24.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.23.7",
"product": {
"name": "Open Source Camunda \u003c7.23.7",
"product_id": "T048979"
}
},
{
"category": "product_version",
"name": "7.23.7",
"product": {
"name": "Open Source Camunda 7.23.7",
"product_id": "T048979-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:camunda:camunda:7.23.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.22.10",
"product": {
"name": "Open Source Camunda \u003c7.22.10",
"product_id": "T048980"
}
},
{
"category": "product_version",
"name": "7.22.10",
"product": {
"name": "Open Source Camunda 7.22.10",
"product_id": "T048980-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:camunda:camunda:7.22.10"
}
}
}
],
"category": "product_name",
"name": "Camunda"
},
{
"category": "product_name",
"name": "Open Source OpenJDK",
"product": {
"name": "Open Source OpenJDK",
"product_id": "580789",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:openjdk:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "11.0.28",
"product": {
"name": "Oracle Java SE 11.0.28",
"product_id": "T047923",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:11.0.28"
}
}
},
{
"category": "product_version",
"name": "17.0.16",
"product": {
"name": "Oracle Java SE 17.0.16",
"product_id": "T047924",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:17.0.16"
}
}
},
{
"category": "product_version",
"name": "21.0.8",
"product": {
"name": "Oracle Java SE 21.0.8",
"product_id": "T047925",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:21.0.8"
}
}
},
{
"category": "product_version",
"name": "8u461-b50",
"product": {
"name": "Oracle Java SE 8u461-b50",
"product_id": "T047961",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:8u461-b50"
}
}
},
{
"category": "product_version",
"name": "8u461-perf",
"product": {
"name": "Oracle Java SE 8u461-perf",
"product_id": "T047962",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:8u461-perf"
}
}
},
{
"category": "product_version",
"name": "8u461",
"product": {
"name": "Oracle Java SE 8u461",
"product_id": "T047963",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:8u461"
}
}
},
{
"category": "product_version",
"name": "GraalVM for JDK 17.0.16",
"product": {
"name": "Oracle Java SE GraalVM for JDK 17.0.16",
"product_id": "T047965",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:graalvm_for_jdk_17.0.16"
}
}
},
{
"category": "product_version",
"name": "GraalVM for JDK 21.0.8",
"product": {
"name": "Oracle Java SE GraalVM for JDK 21.0.8",
"product_id": "T047966",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:graalvm_for_jdk_21.0.8"
}
}
},
{
"category": "product_version",
"name": "GraalVM Enterprise Edition 21.3.15",
"product": {
"name": "Oracle Java SE GraalVM Enterprise Edition 21.3.15",
"product_id": "T047968",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:java_se:graalvm_enterprise_edition_21.3.15"
}
}
}
],
"category": "product_name",
"name": "Java SE"
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T035098",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-31257",
"product_status": {
"known_affected": [
"T008337",
"T048032",
"67646",
"T011169",
"T048031",
"T011128",
"T035098",
"T004914",
"703851",
"703852",
"T038840",
"T047966",
"T048979",
"T047923",
"T048978",
"T047965",
"T020304",
"T047924",
"T047968",
"T047925",
"T048255",
"398363",
"T047962",
"T047963",
"T047961",
"T038839",
"T037607",
"T032255",
"T032495",
"T048745",
"2951",
"T002207",
"T000126",
"T019704",
"580789",
"T027843",
"T026238",
"T048980",
"T048964",
"T048248",
"T048963",
"T048247"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-31257"
},
{
"cve": "CVE-2025-53057",
"product_status": {
"known_affected": [
"T008337",
"T048032",
"67646",
"T011169",
"T048031",
"T011128",
"T035098",
"T004914",
"703851",
"703852",
"T038840",
"T047966",
"T048979",
"T047923",
"T048978",
"T047965",
"T020304",
"T047924",
"T047968",
"T047925",
"T048255",
"398363",
"T047962",
"T047963",
"T047961",
"T038839",
"T037607",
"T032255",
"T032495",
"T048745",
"2951",
"T002207",
"T000126",
"T019704",
"580789",
"T027843",
"T026238",
"T048980",
"T048964",
"T048248",
"T048963",
"T048247"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-53057"
},
{
"cve": "CVE-2025-53066",
"product_status": {
"known_affected": [
"T008337",
"T048032",
"67646",
"T011169",
"T048031",
"T011128",
"T035098",
"T004914",
"703851",
"703852",
"T038840",
"T047966",
"T048979",
"T047923",
"T048978",
"T047965",
"T020304",
"T047924",
"T047968",
"T047925",
"T048255",
"398363",
"T047962",
"T047963",
"T047961",
"T038839",
"T037607",
"T032255",
"T032495",
"T048745",
"2951",
"T002207",
"T000126",
"T019704",
"580789",
"T027843",
"T026238",
"T048980",
"T048964",
"T048248",
"T048963",
"T048247"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-53066"
},
{
"cve": "CVE-2025-61748",
"product_status": {
"known_affected": [
"T008337",
"T048032",
"67646",
"T011169",
"T048031",
"T011128",
"T035098",
"T004914",
"703851",
"703852",
"T038840",
"T047966",
"T048979",
"T047923",
"T048978",
"T047965",
"T020304",
"T047924",
"T047968",
"T047925",
"T048255",
"398363",
"T047962",
"T047963",
"T047961",
"T038839",
"T037607",
"T032255",
"T032495",
"T048745",
"2951",
"T002207",
"T000126",
"T019704",
"580789",
"T027843",
"T026238",
"T048980",
"T048964",
"T048248",
"T048963",
"T048247"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-61748"
},
{
"cve": "CVE-2025-61755",
"product_status": {
"known_affected": [
"T008337",
"T048032",
"67646",
"T011169",
"T048031",
"T011128",
"T035098",
"T004914",
"703851",
"703852",
"T038840",
"T047966",
"T048979",
"T047923",
"T048978",
"T047965",
"T020304",
"T047924",
"T047968",
"T047925",
"T048255",
"398363",
"T047962",
"T047963",
"T047961",
"T038839",
"T037607",
"T032255",
"T032495",
"T048745",
"2951",
"T002207",
"T000126",
"T019704",
"580789",
"T027843",
"T026238",
"T048980",
"T048964",
"T048248",
"T048963",
"T048247"
]
},
"release_date": "2025-10-21T22:00:00.000+00:00",
"title": "CVE-2025-61755"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…