Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-21504 (GCVE-0-2025-21504)
Vulnerability from cvelistv5 – Published: 2025-01-21 20:52 – Updated: 2025-11-03 20:57- Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Oracle Corporation | MySQL Server |
Affected:
* , ≤ 8.0.39
(custom)
Affected: * , ≤ 8.4.2 (custom) Affected: * , ≤ 9.0.1 (custom) cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-21504",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-23T16:24:28.234816Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770 Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-23T16:38:53.003Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T20:57:40.746Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20250124-0010/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"
],
"product": "MySQL Server",
"vendor": "Oracle Corporation",
"versions": [
{
"lessThanOrEqual": "8.0.39",
"status": "affected",
"version": "*",
"versionType": "custom"
},
{
"lessThanOrEqual": "8.4.2",
"status": "affected",
"version": "*",
"versionType": "custom"
},
{
"lessThanOrEqual": "9.0.1",
"status": "affected",
"version": "*",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en-US",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.",
"lang": "en-US"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-21T20:52:57.195Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2025-21504",
"datePublished": "2025-01-21T20:52:57.195Z",
"dateReserved": "2024-12-24T23:18:54.763Z",
"dateUpdated": "2025-11-03T20:57:40.746Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250124-0010/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T20:57:40.746Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-21504\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-23T16:24:28.234816Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770 Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-23T16:24:33.139Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*\", \"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*\", \"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*\"], \"vendor\": \"Oracle Corporation\", \"product\": \"MySQL Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"8.0.39\"}, {\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"8.4.2\"}, {\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.0.1\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpujan2025.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"description\": \"Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2025-01-21T20:52:57.195Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-21504\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T20:57:40.746Z\", \"dateReserved\": \"2024-12-24T23:18:54.763Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2025-01-21T20:52:57.195Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2025-AVI-0054
Vulnerability from certfr_avis - Published: 2025-01-22 - Updated: 2025-01-22
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Backup version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.36 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Connectors (Connector/Python) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 7.6.32 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.39 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Enterprise Backup version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Options) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Options) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Parser) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.36 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Parser) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Performance Schema) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Thread Pooling) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Thread Pooling) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Performance Schema) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors (Connector/Python) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Information Schema) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 7.6.32 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Firewall (Firewall) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Security: Privileges) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Firewall (Firewall) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Firewall (Firewall) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Parser) version 8.0.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) version 8.4.3 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) version 8.4.2 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Performance Schema) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Options) version 9.1.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Thread Pooling) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21543"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21566"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2025-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21531"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-21495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21495"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21548"
},
{
"name": "CVE-2025-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21499"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21520"
},
{
"name": "CVE-2025-21493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21493"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21567",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21567"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
}
],
"initial_release_date": "2025-01-22T00:00:00",
"last_revision_date": "2025-01-22T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0054",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2025-01-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpujan2025",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
]
}
CERTFR-2025-AVI-0864
Vulnerability from certfr_avis - Published: 2025-10-13 - Updated: 2025-10-13
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare Tanzu pour MySQL sur Kubernetes 2.0.0 toutes version",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22064"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22079"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22112"
},
{
"name": "CVE-2023-22092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22092"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-20970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20970"
},
{
"name": "CVE-2024-20960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20960"
},
{
"name": "CVE-2024-20983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20983"
},
{
"name": "CVE-2024-20964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20964"
},
{
"name": "CVE-2024-20963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20963"
},
{
"name": "CVE-2024-20973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20973"
},
{
"name": "CVE-2024-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20961"
},
{
"name": "CVE-2024-20965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20965"
},
{
"name": "CVE-2024-20967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20967"
},
{
"name": "CVE-2024-20984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20984"
},
{
"name": "CVE-2024-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20976"
},
{
"name": "CVE-2024-20971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20971"
},
{
"name": "CVE-2024-20966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20966"
},
{
"name": "CVE-2024-20969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20969"
},
{
"name": "CVE-2024-20981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20981"
},
{
"name": "CVE-2024-20977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20977"
},
{
"name": "CVE-2024-20962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20962"
},
{
"name": "CVE-2024-20978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20978"
},
{
"name": "CVE-2024-20982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20982"
},
{
"name": "CVE-2024-20985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20985"
},
{
"name": "CVE-2024-20972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20972"
},
{
"name": "CVE-2024-20968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20968"
},
{
"name": "CVE-2024-20974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20974"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-21055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21055"
},
{
"name": "CVE-2024-21000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21000"
},
{
"name": "CVE-2024-21050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21050"
},
{
"name": "CVE-2024-21015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21015"
},
{
"name": "CVE-2024-20994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20994"
},
{
"name": "CVE-2024-21056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21056"
},
{
"name": "CVE-2024-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21047"
},
{
"name": "CVE-2024-21051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21051"
},
{
"name": "CVE-2024-21057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21057"
},
{
"name": "CVE-2024-20998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20998"
},
{
"name": "CVE-2024-21069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21069"
},
{
"name": "CVE-2024-21013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21013"
},
{
"name": "CVE-2024-21009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21009"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2024-21054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21054"
},
{
"name": "CVE-2024-21008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21008"
},
{
"name": "CVE-2024-21060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21060"
},
{
"name": "CVE-2024-21052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21052"
},
{
"name": "CVE-2024-21053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21053"
},
{
"name": "CVE-2024-21062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21062"
},
{
"name": "CVE-2024-21049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21049"
},
{
"name": "CVE-2024-21061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21061"
},
{
"name": "CVE-2024-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21102"
},
{
"name": "CVE-2024-20993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20993"
},
{
"name": "CVE-2024-21087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21087"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2016-20013",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20013"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2022-48566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48566"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2023-45918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45918"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
}
],
"initial_release_date": "2025-10-13T00:00:00",
"last_revision_date": "2025-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36208"
}
]
}
CNVD-2025-02308
Vulnerability from cnvd - Published: 2025-01-24厂商已发布了漏洞修复程序,请及时关注更新: https://www.oracle.com/security-alerts/cpujan2025.html
| Name | ['Oracle MySQL Server <=8.0.39', 'Oracle MySQL Server <=8.4.2', 'Oracle MySQL Server <=9.0.1'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-21504",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504"
}
},
"description": "Oracle MySQL\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684\u5173\u7cfb\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002MySQL Server\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u6570\u636e\u5e93\u670d\u52a1\u5668\u7ec4\u4ef6\u3002\n\nOracle MySQL\u7684MySQL Server\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4MySQL Server\u6302\u8d77\u6216\u9891\u7e41\u91cd\u590d\u5d29\u6e83\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.oracle.com/security-alerts/cpujan2025.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-02308",
"openTime": "2025-01-24",
"patchDescription": "Oracle MySQL\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684\u5173\u7cfb\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002MySQL Server\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u6570\u636e\u5e93\u670d\u52a1\u5668\u7ec4\u4ef6\u3002\r\n\r\nOracle MySQL\u7684MySQL Server\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4MySQL Server\u6302\u8d77\u6216\u9891\u7e41\u91cd\u590d\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-02308\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Oracle MySQL Server \u003c=8.0.39",
"Oracle MySQL Server \u003c=8.4.2",
"Oracle MySQL Server \u003c=9.0.1"
]
},
"referenceLink": "https://www.oracle.com/security-alerts/cpujan2025.html",
"serverity": "\u4e2d",
"submitTime": "2025-01-24",
"title": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-02308\uff09"
}
FKIE_CVE-2025-21504
Vulnerability from fkie_nvd - Published: 2025-01-21 21:15 - Updated: 2025-11-03 21:18| Vendor | Product | Version | |
|---|---|---|---|
| oracle | mysql_server | * | |
| oracle | mysql_server | * | |
| oracle | mysql_server | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C338948-2AAC-47B7-B3CD-C5F10B1AE7ED",
"versionEndIncluding": "8.0.39",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9AED5FB1-1F21-4D10-904F-3124A719B08A",
"versionEndIncluding": "8.4.2",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68961D2D-4D0A-4407-87B3-55CD49B84675",
"versionEndIncluding": "9.0.1",
"versionStartIncluding": "9.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles afectadas son 8.0.39 y anteriores, 8.4.2 y anteriores y 9.0.1 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos ponga en peligro MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetible (DOS completo) de MySQL Server. Puntuaci\u00f3n base de CVSS 3.1: 4,9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
}
],
"id": "CVE-2025-21504",
"lastModified": "2025-11-03T21:18:56.467",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "secalert_us@oracle.com",
"type": "Secondary"
}
]
},
"published": "2025-01-21T21:15:15.447",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20250124-0010/"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-770"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
cve-2025-21504
Vulnerability from osv_almalinux
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
- openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
- krb5: GSS message token handling (CVE-2024-37371)
- curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)
- mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)
- mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)
- mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)
- mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)
- mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)
- mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)
- mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)
- mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)
- mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)
- mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)
- mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)
- curl: curl netrc password leak (CVE-2024-11053)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)
- mysql: MySQL Server Options Vulnerability (CVE-2025-21520)
- mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)
- mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)
- mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)
- mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)
- mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)
- mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)
- mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)
- mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)
- mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.6.0+3340+d764b636"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.6.0+3340+d764b636"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-ipadic"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-17.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-ipadic-EUCJP"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-17.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-test"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. \n\nSecurity Fix(es): \n\n * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n * krb5: GSS message token handling (CVE-2024-37371)\n * curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n * mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n * mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n * mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n * mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n * mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n * mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n * mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n * mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n * mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n * mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n * mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n * curl: curl netrc password leak (CVE-2024-11053)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n * mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n * mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n * mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n * mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n * mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n * mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n * mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n * mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n * mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n * mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:1673",
"modified": "2025-02-20T11:16:10Z",
"published": "2025-02-19T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-11053"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21193"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21194"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21196"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21197"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21198"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21199"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21201"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21203"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21212"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21213"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21218"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21219"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21230"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21231"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21236"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21237"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21238"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21239"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21241"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21247"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-5535"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-7264"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21490"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21491"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21494"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21497"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21500"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21501"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21503"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21504"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21505"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21518"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21519"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21520"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21521"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21522"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21523"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21525"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21529"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21531"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21534"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21536"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21540"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21543"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21546"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21555"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21559"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294581"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294676"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301888"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318857"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318858"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318870"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318873"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318874"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318876"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318882"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318883"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318884"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318885"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318886"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318897"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318900"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318905"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318914"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318922"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318923"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318925"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318926"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318927"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331191"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339218"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339220"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339221"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339226"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339231"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339236"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339238"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339243"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339247"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339252"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339259"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339266"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339270"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339271"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339275"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339277"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339281"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339284"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339291"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339293"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339299"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339300"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339304"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339305"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2025-1673.html"
}
],
"related": [
"CVE-2024-5535",
"CVE-2024-37371",
"CVE-2024-7264",
"CVE-2024-21238",
"CVE-2024-21196",
"CVE-2024-21241",
"CVE-2024-21231",
"CVE-2024-21197",
"CVE-2024-21218",
"CVE-2024-21201",
"CVE-2024-21236",
"CVE-2024-21237",
"CVE-2024-21203",
"CVE-2024-21212",
"CVE-2024-21219",
"CVE-2024-21230",
"CVE-2024-21213",
"CVE-2024-21194",
"CVE-2024-21199",
"CVE-2024-21193",
"CVE-2024-21198",
"CVE-2024-21247",
"CVE-2024-21239",
"CVE-2024-11053",
"CVE-2025-21497",
"CVE-2025-21520",
"CVE-2025-21490",
"CVE-2025-21529",
"CVE-2025-21531",
"CVE-2025-21504",
"CVE-2025-21540",
"CVE-2025-21555",
"CVE-2025-21543",
"CVE-2025-21491",
"CVE-2025-21525",
"CVE-2025-21536",
"CVE-2025-21521",
"CVE-2025-21501",
"CVE-2025-21534",
"CVE-2025-21494",
"CVE-2025-21519",
"CVE-2025-21522",
"CVE-2025-21503",
"CVE-2025-21518",
"CVE-2025-21559",
"CVE-2025-21546",
"CVE-2025-21500",
"CVE-2025-21523",
"CVE-2025-21505"
],
"summary": "Important: mysql:8.0 security update"
}
cve-2025-21504
Vulnerability from osv_almalinux
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
- openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
- krb5: GSS message token handling (CVE-2024-37371)
- curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)
- mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)
- mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)
- mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)
- mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)
- mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)
- mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)
- mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)
- mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)
- mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)
- mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)
- mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)
- curl: curl netrc password leak (CVE-2024-11053)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)
- mysql: MySQL Server Options Vulnerability (CVE-2025-21520)
- mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)
- mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)
- mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)
- mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)
- mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)
- mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)
- mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)
- mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)
- mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-test"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. \n\nSecurity Fix(es): \n\n * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n * krb5: GSS message token handling (CVE-2024-37371)\n * curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n * mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n * mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n * mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n * mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n * mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n * mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n * mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n * mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n * mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n * mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n * mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n * curl: curl netrc password leak (CVE-2024-11053)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n * mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n * mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n * mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n * mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n * mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n * mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n * mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n * mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n * mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n * mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:1671",
"modified": "2025-02-20T14:55:32Z",
"published": "2025-02-19T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-11053"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21193"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21194"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21196"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21197"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21198"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21199"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21201"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21203"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21212"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21213"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21218"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21219"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21230"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21231"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21236"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21237"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21238"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21239"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21241"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21247"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-5535"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-7264"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21490"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21491"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21494"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21497"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21500"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21501"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21503"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21504"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21505"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21518"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21519"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21520"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21521"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21522"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21523"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21525"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21529"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21531"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21534"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21536"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21540"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21543"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21546"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21555"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21559"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294581"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294676"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301888"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318857"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318858"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318870"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318873"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318874"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318876"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318882"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318883"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318884"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318885"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318886"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318897"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318900"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318905"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318914"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318922"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318923"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318925"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318926"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318927"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331191"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339218"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339220"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339221"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339226"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339231"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339236"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339238"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339243"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339247"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339252"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339259"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339266"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339270"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339271"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339275"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339277"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339281"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339284"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339291"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339293"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339299"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339300"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339304"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339305"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2025-1671.html"
}
],
"related": [
"CVE-2024-5535",
"CVE-2024-37371",
"CVE-2024-7264",
"CVE-2024-21238",
"CVE-2024-21196",
"CVE-2024-21241",
"CVE-2024-21231",
"CVE-2024-21197",
"CVE-2024-21218",
"CVE-2024-21201",
"CVE-2024-21236",
"CVE-2024-21237",
"CVE-2024-21203",
"CVE-2024-21212",
"CVE-2024-21219",
"CVE-2024-21230",
"CVE-2024-21213",
"CVE-2024-21194",
"CVE-2024-21199",
"CVE-2024-21193",
"CVE-2024-21198",
"CVE-2024-21247",
"CVE-2024-21239",
"CVE-2024-11053",
"CVE-2025-21497",
"CVE-2025-21520",
"CVE-2025-21490",
"CVE-2025-21529",
"CVE-2025-21531",
"CVE-2025-21504",
"CVE-2025-21540",
"CVE-2025-21555",
"CVE-2025-21543",
"CVE-2025-21491",
"CVE-2025-21525",
"CVE-2025-21536",
"CVE-2025-21521",
"CVE-2025-21501",
"CVE-2025-21534",
"CVE-2025-21494",
"CVE-2025-21519",
"CVE-2025-21522",
"CVE-2025-21503",
"CVE-2025-21518",
"CVE-2025-21559",
"CVE-2025-21546",
"CVE-2025-21500",
"CVE-2025-21523",
"CVE-2025-21505"
],
"summary": "Important: mysql security update"
}
GHSA-M32H-HFWG-3R8R
Vulnerability from github – Published: 2025-01-21 21:30 – Updated: 2025-11-03 21:32Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
{
"affected": [],
"aliases": [
"CVE-2025-21504"
],
"database_specific": {
"cwe_ids": [
"CWE-770"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-21T21:15:15Z",
"severity": "MODERATE"
},
"details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"id": "GHSA-m32h-hfwg-3r8r",
"modified": "2025-11-03T21:32:18Z",
"published": "2025-01-21T21:30:55Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20250124-0010"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
CVE-2025-21504
Vulnerability from fstec - Published: 25.12.2024{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Oracle Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (\u0410\u043b\u044c\u0442 8 \u0421\u041f), \u0434\u043e 8.0.39 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Server), \u0434\u043e 8.4.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Server), \u0434\u043e 9.0.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Server)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://www.oracle.com/security-alerts/cpujan2025.html\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430: https://altsp.su/obnovleniya-bezopasnosti/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "25.12.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "20.06.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "23.01.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-00649",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-21504",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "\u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), MySQL Server",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Server: Optimizer \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 Oracle MySQL Server, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20), \u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Server: Optimizer \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 Oracle MySQL Server \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432, \u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://vuldb.com/?id.292824\nhttps://www.oracle.com/security-alerts/cpujan2025.html\nhttps://www.cybersecurity-help.cz/vdb/SB2025012217\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0423\u0411\u0414",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20, CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,9)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.