{"id":1097,"date":"2025-07-09T14:26:52","date_gmt":"2025-07-09T14:26:52","guid":{"rendered":"https:\/\/oerlabs.com.br\/blog\/?p=1097"},"modified":"2025-07-09T14:28:36","modified_gmt":"2025-07-09T14:28:36","slug":"microsoft-corrige-130-vulnerabilidades-incluindo-falhas-criticas-no-spnego-e-no-sql-server","status":"publish","type":"post","link":"https:\/\/oerlabs.com.br\/blog\/2025\/07\/09\/microsoft-corrige-130-vulnerabilidades-incluindo-falhas-criticas-no-spnego-e-no-sql-server\/","title":{"rendered":"Microsoft corrige 130 vulnerabilidades, incluindo falhas cr\u00edticas no SPNEGO e no SQL Server"},"content":{"rendered":"\n<p class=\"\">Pela primeira vez em 2025, as atualiza\u00e7\u00f5es do Patch Tuesday da Microsoft n\u00e3o inclu\u00edram corre\u00e7\u00f5es para vulnerabilidades de seguran\u00e7a exploradas, mas a empresa reconheceu que uma das falhas corrigidas era de conhecimento p\u00fablico.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"\">Os patches resolvem&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Jul\" rel=\"noreferrer noopener\" target=\"_blank\">impressionantes 130 vulnerabilidades<\/a>&nbsp;, juntamente com 10 outros CVEs n\u00e3o relacionados \u00e0 Microsoft que afetam o Visual Studio, a AMD e seu navegador Edge baseado em Chromium. Destas, 10 s\u00e3o classificadas como Cr\u00edticas e as demais como Importantes em termos de gravidade.<\/p>\n\n\n\n<p class=\"\">&#8220;A sequ\u00eancia de 11 meses de corre\u00e7\u00e3o de pelo menos um zero-day que foi explorado na pr\u00e1tica terminou este m\u00eas&#8221;, disse Satnam Narang, engenheiro s\u00eanior de pesquisa da Tenable.<\/p>\n\n\n\n<p class=\"\">Cinquenta e tr\u00eas dessas defici\u00eancias s\u00e3o classificadas como bugs de escalonamento de privil\u00e9gios, seguidas por 42 como execu\u00e7\u00e3o remota de c\u00f3digo, 17 como divulga\u00e7\u00e3o de informa\u00e7\u00f5es e 8 como desvios de recursos de seguran\u00e7a. Esses patches se somam a&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/deployedge\/microsoft-edge-relnotes-security\" rel=\"noreferrer noopener\" target=\"_blank\">outras duas falhas<\/a>&nbsp;corrigidas pela empresa no navegador Edge desde o lan\u00e7amento da&nbsp;<a href=\"https:\/\/thehackernews.com\/2025\/06\/microsoft-patches-67-vulnerabilities.html\" rel=\"noreferrer noopener\" target=\"_blank\">atualiza\u00e7\u00e3o Patch Tuesday do m\u00eas passado<\/a>&nbsp;.<\/p>\n\n\n\n<p class=\"\">A vulnerabilidade listada como publicamente conhecida \u00e9 uma falha de divulga\u00e7\u00e3o de informa\u00e7\u00f5es no Microsoft SQL Server (&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-49719\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49719<\/a>&nbsp;, pontua\u00e7\u00e3o CVSS: 7,5) que pode permitir que um invasor n\u00e3o autorizado vaze mem\u00f3ria n\u00e3o inicializada.<\/p>\n\n\n\n<p class=\"\">&#8220;Um invasor pode muito bem n\u00e3o aprender nada de valor, mas com sorte, persist\u00eancia ou alguma manipula\u00e7\u00e3o muito astuta do exploit, o pr\u00eamio pode ser material de chave criptogr\u00e1fica ou outras joias da coroa do SQL Server&#8221;, disse Adam Barnett, engenheiro-chefe de software da Rapid7, em um comunicado.<\/p>\n\n\n\n<p class=\"\">Mike Walters, presidente e cofundador da Action1,&nbsp;<a href=\"https:\/\/www.action1.com\/patch-tuesday\/patch-tuesday-july-2025\/\" rel=\"noreferrer noopener\" target=\"_blank\">disse que<\/a>&nbsp;a falha provavelmente \u00e9 resultado de valida\u00e7\u00e3o de entrada inadequada no gerenciamento de mem\u00f3ria do SQL Server, permitindo acesso \u00e0 mem\u00f3ria n\u00e3o inicializada.<\/p>\n\n\n\n<p class=\"\">&#8220;Como resultado, os invasores conseguiram recuperar resqu\u00edcios de dados confidenciais, como credenciais ou strings de conex\u00e3o&#8221;, acrescentou Walters. &#8220;Isso afeta tanto o mecanismo do SQL Server quanto os aplicativos que usam drivers OLE DB.&#8221;<\/p>\n\n\n\n<p class=\"\">A falha mais cr\u00edtica corrigida pela Microsoft como parte das atualiza\u00e7\u00f5es deste m\u00eas diz respeito a um caso de execu\u00e7\u00e3o remota de c\u00f3digo que impactou o SPNEGO Extended Negotiation (&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/openspecs\/windows_protocols\/ms-negoex\/77c795cf-e522-4678-b0f1-2063c5c0561c\" rel=\"noreferrer noopener\" target=\"_blank\">NEGOEX<\/a>&nbsp;). Rastreada como&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-47981\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-47981<\/a>&nbsp;, ela possui uma pontua\u00e7\u00e3o CVSS de 9,8 de 10,0.<\/p>\n\n\n\n<p class=\"\">&#8220;O estouro de buffer baseado em heap no SPNEGO Extended Negotiation do Windows permite que um invasor n\u00e3o autorizado execute c\u00f3digo em uma rede&#8221;, afirmou a Microsoft em um comunicado. &#8220;Um invasor pode explorar essa vulnerabilidade enviando uma mensagem maliciosa ao servidor, o que pode levar \u00e0 execu\u00e7\u00e3o remota de c\u00f3digo.&#8221;<a><\/a><\/p>\n\n\n\n<p class=\"\">Um pesquisador an\u00f4nimo e Yuki Chen foram creditados pela descoberta e corre\u00e7\u00e3o da falha. A Microsoft observou que o problema afeta apenas m\u00e1quinas clientes Windows com Windows 10, vers\u00e3o 1607 e superior, devido ao Objeto de Pol\u00edtica de Grupo (&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/previous-versions\/windows\/desktop\/policy\/group-policy-objects\" rel=\"noreferrer noopener\" target=\"_blank\">GPO<\/a>&nbsp;) &#8220;Seguran\u00e7a de rede: Permitir que solicita\u00e7\u00f5es de autentica\u00e7\u00e3o PKU2U para este computador usem identidades online&#8221; estar habilitado por padr\u00e3o.<\/p>\n\n\n\n<p class=\"\">&#8220;Como sempre, a Execu\u00e7\u00e3o Remota de C\u00f3digo \u00e9 ruim, mas an\u00e1lises iniciais sugerem que essa vulnerabilidade pode ser &#8216;wormable&#8217; \u2014 o tipo de vulnerabilidade que pode ser aproveitada em malware autopropagante e fazer com que muitos relembrem o trauma do incidente WannaCry&#8221;, disse o fundador e CEO da watchTowr, Benjamin Harris.<\/p>\n\n\n\n<p class=\"\">A Microsoft \u00e9 clara sobre os pr\u00e9-requisitos: n\u00e3o \u00e9 necess\u00e1ria autentica\u00e7\u00e3o, apenas acesso \u00e0 rede, e a pr\u00f3pria Microsoft acredita que a explora\u00e7\u00e3o \u00e9 &#8216;Mais Prov\u00e1vel&#8217;. N\u00e3o devemos nos enganar: se a ind\u00fastria privada percebeu essa vulnerabilidade, ela certamente j\u00e1 est\u00e1 no radar de qualquer invasor com um pingo de mal\u00edcia. Os defensores precisam largar tudo, aplicar patches rapidamente e ca\u00e7ar os sistemas expostos.<\/p>\n\n\n\n<p class=\"\">Outras vulnerabilidades importantes incluem falhas de execu\u00e7\u00e3o remota de c\u00f3digo que afetam o Windows KDC Proxy Service (&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-49735\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49735<\/a>&nbsp;, pontua\u00e7\u00e3o CVSS: 8.1), Windows Hyper-V (&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-48822\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-48822<\/a>&nbsp;, pontua\u00e7\u00e3o CVSS: 8.6) e Microsoft Office (&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-49695\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49695<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-49696\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-496966<\/a>&nbsp;e&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-49697\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49697<\/a>&nbsp;, pontua\u00e7\u00f5es CVSS: 8.4).<\/p>\n\n\n\n<p class=\"\">&#8220;O que torna o CVE-2025-49735 significativo \u00e9 a exposi\u00e7\u00e3o da rede, combinada \u00e0 aus\u00eancia de privil\u00e9gios ou intera\u00e7\u00e3o do usu\u00e1rio. Apesar da alta complexidade do ataque, a vulnerabilidade abre caminho para comprometimento remoto pr\u00e9-autentica\u00e7\u00e3o, particularmente atraente para APTs e agentes estatais&#8221;, afirmou Ben McCarthy, Engenheiro-Chefe de Seguran\u00e7a Cibern\u00e9tica da Immersive.<\/p>\n\n\n\n<p class=\"\">O invasor precisa vencer uma condi\u00e7\u00e3o de corrida \u2013 uma falha de tempo em que a mem\u00f3ria \u00e9 liberada e realocada em uma janela espec\u00edfica \u2013 o que significa que a confiabilidade \u00e9 baixa por enquanto. Ainda assim, esses problemas podem ser transformados em armas com t\u00e9cnicas como a prepara\u00e7\u00e3o de heap, tornando poss\u00edvel uma eventual explora\u00e7\u00e3o.<\/p>\n\n\n\n<p class=\"\">Em outro lugar, a atualiza\u00e7\u00e3o fecha cinco desvios de recursos de seguran\u00e7a no Bitlocker (&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-48001\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-48001<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-48003\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-48003<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-48800\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-48800<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-48804\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-48804<\/a>&nbsp;e&nbsp;<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-48818\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-48818<\/a>&nbsp;, pontua\u00e7\u00f5es CVSS: 6,8) que podem permitir que um invasor com acesso f\u00edsico ao dispositivo obtenha dados criptografados.<\/p>\n\n\n\n<p class=\"\">&#8220;Um invasor pode explorar essa vulnerabilidade carregando um arquivo WinRE.wim enquanto o volume do sistema operacional estiver desbloqueado, concedendo acesso aos dados criptografados do BitLocker&#8221;, disse a Microsoft sobre o CVE-2025-48804.<\/p>\n\n\n\n<p class=\"\">Os pesquisadores Netanel Ben Simon e Alon Leviev, da Microsoft Offensive Research and Security Engineering (MORSE), foram reconhecidos por relatar os cinco problemas na ferramenta de criptografia de disco integrada.<\/p>\n\n\n\n<p class=\"\">&#8220;Se exploradas, essas falhas podem expor arquivos e credenciais confidenciais ou permitir adultera\u00e7\u00f5es na integridade do sistema&#8221;, disse Jacob Ashdown, engenheiro de seguran\u00e7a cibern\u00e9tica da Immersive. &#8220;Isso representa um risco particular, especialmente para organiza\u00e7\u00f5es onde dispositivos podem ser perdidos ou roubados, pois invasores com acesso direto podem potencialmente contornar a criptografia e extrair dados confidenciais.&#8221;<\/p>\n\n\n\n<p class=\"\">Tamb\u00e9m vale a pena&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/lifecycle\/faq\/extended-security-updates\" rel=\"noreferrer noopener\" target=\"_blank\">notar<\/a>&nbsp;que 8 de julho de 2025 marca oficialmente o fim da linha para o SQL Server 2012, que n\u00e3o receber\u00e1 mais nenhum patch de seguran\u00e7a futuro na lista do programa Extended Security Update (ESU) que est\u00e1 chegando ao fim.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"software-patches-from-other-vendors\">Patches de software de outros fornecedores<\/h3>\n\n\n\n<p class=\"\">Al\u00e9m da Microsoft, atualiza\u00e7\u00f5es de seguran\u00e7a tamb\u00e9m foram lan\u00e7adas por outros fornecedores nas \u00faltimas semanas para corrigir diversas vulnerabilidades, incluindo \u2014<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"\"><a href=\"https:\/\/helpx.adobe.com\/security\/security-bulletin.html\" target=\"_blank\" rel=\"noreferrer noopener\">Adobe<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.amd.com\/en\/resources\/product-security.html#security\" target=\"_blank\" rel=\"noreferrer noopener\">AMD<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.atlassian.com\/trust\/security\/advisories\" target=\"_blank\" rel=\"noreferrer noopener\">Atlassian<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.bitdefender.com\/consumer\/support\/?post_type=security_advisories\" target=\"_blank\" rel=\"noreferrer noopener\">Bitdefender<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/support.broadcom.com\/web\/ecx\/search?searchString=cve&amp;activeType=all&amp;from=0&amp;sortby=post_time&amp;orderBy=desc&amp;pageNo=1&amp;aggregations=%5B%7B%22type%22%3A%22_type%22%2C%22filter%22%3A%5B%22notification_docs%22%5D%7D%5D&amp;uid=d042dbba-f8c4-11ea-beba-0242ac12000b&amp;resultsPerPage=50&amp;exactPhrase=&amp;withOneOrMore=&amp;withoutTheWords=&amp;pageSize=50&amp;language=en&amp;state=34&amp;suCaseCreate=false\" target=\"_blank\" rel=\"noreferrer noopener\">Broadcom<\/a>&nbsp;(incluindo VMware)<\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/tools.cisco.com\/security\/center\/publicationListing.x\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/support.citrix.com\/support-home\/topic-article-list?trendingCategory=20&amp;trendingTopicName=Security%20Bulletin\" target=\"_blank\" rel=\"noreferrer noopener\">Citrix<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/supportannouncement.us.dlink.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">D-Link<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.dell.com\/support\/security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dell<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.drupal.org\/security\" target=\"_blank\" rel=\"noreferrer noopener\">Drupal<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/my.f5.com\/manage\/s\/new-updated-articles#sort=%40f5_updated_published_date%20descending&amp;f:@f5_document_type=[Security%20Advisory]&amp;periodFilter=0&amp;dateField=1\" target=\"_blank\" rel=\"noreferrer noopener\">F5<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.fortiguard.com\/psirt\" target=\"_blank\" rel=\"noreferrer noopener\">Fortinet<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.fortra.com\/security\/advisories\/product-security\" target=\"_blank\" rel=\"noreferrer noopener\">Fortra<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.gigabyte.com\/us\/Support\/Security\" target=\"_blank\" rel=\"noreferrer noopener\">Gigabyte<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/about.gitlab.com\/releases\/2025\/06\/25\/patch-release-gitlab-18-1-1-released\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitLab<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/chromereleases.googleblog.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google Chrome<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/cloud.google.com\/support\/bulletins\" target=\"_blank\" rel=\"noreferrer noopener\">Google Cloud<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/grafana.com\/security\/security-advisories\/\" target=\"_blank\" rel=\"noreferrer noopener\">Grafana<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.hikvision.com\/en\/support\/cybersecurity\/security-advisory\/\" target=\"_blank\" rel=\"noreferrer noopener\">Hikvision<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.hitachienergy.com\/in\/en\/products-and-solutions\/cybersecurity\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">Hitachi Energy<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/support.hp.com\/us-en\/security-bulletins\" target=\"_blank\" rel=\"noreferrer noopener\">HP<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/support.hpe.com\/connect\/s\/securitybulletinlibrary?language=en_US#sort=%40hpescuniversaldate%20descending&amp;layout=table&amp;numberOfResults=25&amp;f:@kmdoclanguagecode=[cv1871440]&amp;hpe=1\" target=\"_blank\" rel=\"noreferrer noopener\">HP Enterprise<\/a>&nbsp;(incluindo Aruba Networking)<\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.ibm.com\/support\/pages\/bulletin\/\" target=\"_blank\" rel=\"noreferrer noopener\">IBM<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/default.html\" target=\"_blank\" rel=\"noreferrer noopener\">Intel<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/forums.ivanti.com\/s\/searchallcontent?language=en_US#tab=All&amp;sortCriteria=date%20descending&amp;f-sfkbknowledgearticletypec=Security%20Advisory\" target=\"_blank\" rel=\"noreferrer noopener\">Ivanti<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.jenkins.io\/security\/advisories\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jenkins<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/supportportal.juniper.net\/s\/global-search\/%40uri?language=en_US#sortCriteria=date%20descending&amp;f-sf_articletype=Security%20Advisories\" target=\"_blank\" rel=\"noreferrer noopener\">Redes Juniper<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/support.lenovo.com\/us\/en\/product_security\/ps500001-lenovo-product-security-advisories\" target=\"_blank\" rel=\"noreferrer noopener\">Lenovo<\/a><\/li>\n\n\n\n<li class=\"\">Distribui\u00e7\u00f5es Linux&nbsp;<a href=\"https:\/\/errata.almalinux.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">AlmaLinux<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/security.alpinelinux.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Alpine Linux<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/alas.aws.amazon.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Amazon Linux<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/security.archlinux.org\/advisory\" target=\"_blank\" rel=\"noreferrer noopener\">Arch Linux<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/www.debian.org\/security\/#DSAS\" target=\"_blank\" rel=\"noreferrer noopener\">Debian<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/security.gentoo.org\/glsa\" target=\"_blank\" rel=\"noreferrer noopener\">Gentoo<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/linux.oracle.com\/ords\/f?p=105:21::::RP::\" target=\"_blank\" rel=\"noreferrer noopener\">Oracle Linux<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/advisories.mageia.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mageia<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/access.redhat.com\/security\/security-updates\/security-advisories\" target=\"_blank\" rel=\"noreferrer noopener\">Red Hat<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/errata.rockylinux.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Rocky Linux<\/a>&nbsp;,&nbsp;<a href=\"https:\/\/www.suse.com\/support\/update\/\" target=\"_blank\" rel=\"noreferrer noopener\">SUSE<\/a>&nbsp;e&nbsp;<a href=\"https:\/\/ubuntu.com\/security\/notices\" target=\"_blank\" rel=\"noreferrer noopener\">Ubuntu<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/corp.mediatek.com\/product-security-bulletin\/July-2025\" target=\"_blank\" rel=\"noreferrer noopener\">MediaTek<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.mitsubishielectric.com\/en\/psirt\/vulnerability\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">Mitsubishi Electric<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.mongodb.com\/alerts#security\" target=\"_blank\" rel=\"noreferrer noopener\">MongoDB<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.moxa.com\/en\/support\/product-support\/security-advisory\" target=\"_blank\" rel=\"noreferrer noopener\">Moxa<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mozilla Thunderbird<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.nvidia.com\/en-us\/security\/\" target=\"_blank\" rel=\"noreferrer noopener\">NVIDIA<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/security.oppo.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">OPPO<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/security.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Redes Palo Alto<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/community.progress.com\/s\/global-search\/%40uri#t=KnowledgeBase&amp;sort=date%20descending&amp;numberOfResults=100&amp;f:@sfdcareaofinterest=[Defects]&amp;f:@sfarticletypec=[Product_Alert,Critical_Alert]\" target=\"_blank\" rel=\"noreferrer noopener\">Progress Software<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/docs.qualcomm.com\/product\/publicresources\/securitybulletin\/\" target=\"_blank\" rel=\"noreferrer noopener\">Qualcomm<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.ricoh.com\/products\/security\/vulnerabilities\" target=\"_blank\" rel=\"noreferrer noopener\">Ricoh<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/kb.cert.org\/vuls\/id\/613753\" target=\"_blank\" rel=\"noreferrer noopener\">Ruckus Wireless<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/security.samsungmobile.com\/securityUpdate.smsb\" target=\"_blank\" rel=\"noreferrer noopener\">Samsung<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news\/july-2025.html\" target=\"_blank\" rel=\"noreferrer noopener\">SEIVA<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.se.com\/ww\/en\/work\/support\/cybersecurity\/security-notifications.jsp\" target=\"_blank\" rel=\"noreferrer noopener\">Schneider Electric<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/support.servicenow.com\/kb?id=kb_article_view&amp;sysparm_article=KB1226057\" target=\"_blank\" rel=\"noreferrer noopener\">Servi\u00e7o agora<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.siemens.com\/global\/en\/products\/services\/cert.html#SiemensSecurityAdvisories\" target=\"_blank\" rel=\"noreferrer noopener\">Siemens<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/advisory.splunk.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Splunk<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.supermicro.com\/en\/support\/security_center#!advisories\" target=\"_blank\" rel=\"noreferrer noopener\">Supermicro<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.veeam.com\/knowledge-base.html?type=security&amp;page=1\" target=\"_blank\" rel=\"noreferrer noopener\">Veeam<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/wordpress.org\/news\/2025\/06\/dropping-security-updates-for-wordpress-versions-4-1-through-4-6\/\" target=\"_blank\" rel=\"noreferrer noopener\">WordPress<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/wiki.zimbra.com\/wiki\/Security_Center\" target=\"_blank\" rel=\"noreferrer noopener\">Zimbra<\/a>&nbsp;, e<\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/explore.zoom.us\/en\/trust\/security\/security-bulletin\/\" target=\"_blank\" rel=\"noreferrer noopener\">Amplia\u00e7\u00e3o<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"\"><em>Fonte: The Hacker News<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n","protected":false},"excerpt":{"rendered":"<p>Pela primeira vez em 2025, as atualiza\u00e7\u00f5es do Patch Tuesday da Microsoft n\u00e3o inclu\u00edram corre\u00e7\u00f5es para vulnerabilidades de seguran\u00e7a exploradas, mas a empresa reconheceu que uma das falhas corrigidas era de conhecimento p\u00fablico. Os patches resolvem&nbsp;impressionantes 130 vulnerabilidades&nbsp;, juntamente com 10 outros CVEs n\u00e3o relacionados \u00e0 Microsoft que afetam o Visual Studio, a AMD e [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1098,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[5,7],"tags":[],"class_list":["post-1097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desenvolvimento","category-hackers"],"_links":{"self":[{"href":"https:\/\/oerlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/1097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oerlabs.com.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oerlabs.com.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oerlabs.com.br\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oerlabs.com.br\/blog\/wp-json\/wp\/v2\/comments?post=1097"}],"version-history":[{"count":2,"href":"https:\/\/oerlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/1097\/revisions"}],"predecessor-version":[{"id":1100,"href":"https:\/\/oerlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/1097\/revisions\/1100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oerlabs.com.br\/blog\/wp-json\/wp\/v2\/media\/1098"}],"wp:attachment":[{"href":"https:\/\/oerlabs.com.br\/blog\/wp-json\/wp\/v2\/media?parent=1097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oerlabs.com.br\/blog\/wp-json\/wp\/v2\/categories?post=1097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oerlabs.com.br\/blog\/wp-json\/wp\/v2\/tags?post=1097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}