[{"id":"ci_0bc4974cb4cfa80ee83f80128d41c5fd605880022021d97ec659d39c61f790d7","title":"IGEL Produktsicherheitsinformationen","path":"/de/security-safety/current/igel-product-security-information","children":[{"id":"ci_3decacdc39704d57d955156ecd55dcb964722a6085dc2da3165d848a23e53ebf","title":"ISN 2025-33: Sicherheitslücken in Chromium","path":"/de/security-safety/current/isn-2025-33-chromium-vulnerabilities","children":[]},{"id":"ci_1db47be1a2f8951f7b2c6777628cfe3a2cb61c1b83f9f7c9ffef9be86802d340","title":"ISN 2025-32: Sicherheitslücken in Webkit","path":"/de/security-safety/current/isn-2025-32-webkit-vulnerabilities","children":[]},{"id":"ci_b4fd828359c51cd830f721fa221042e8da843fa2d58e8f9592d2372bd98cb122","title":"ISN 2025-31: XSS-Sicherheitslücken in UMS","path":"/de/security-safety/current/isn-2025-31-xss-vulnerabilities-in-ums","children":[]},{"id":"ci_62fdc6c93718122f05c93eb6e732397aa77d449a15336f9a9f12cce771817c52","title":"ISN 2025-30: Sicherheitslücken in Firefox ESR","path":"/de/security-safety/current/isn-2025-30-firefox-esr-vulnerabilities","children":[]},{"id":"ci_fe50351fe158408b11c99af033b5665299f2efa8311f66e8c19237a895a30c1a","title":"ISN 2025-29: Chromium-Sicherheitslücke in ANGLE wird aktiv ausgenutzt","path":"/de/security-safety/current/isn-2025-29-chromium-vulnerability-in-angle-exploi","children":[]},{"id":"ci_065dfd1a24e227c94535604940d1cecf5393d3444b69177b6c376f57c5c4d8c4","title":"ISN 2025-26: Chromium-Sicherheitslücke wird aktiv ausgenutzt","path":"/de/security-safety/current/isn-2025-26-chromium-vulnerability-exploited-in-th","children":[]},{"id":"ci_c90595bcbe06ce2560da8dc16da29f28518bc488bbc1f35a472c3316dd247197","title":"ISN 2025-25: Sicherheitslücke in Firefox ESR","path":"/de/security-safety/current/isn-2025-25-firefox-esr-vulnerability","children":[]},{"id":"ci_648f4f17f779a33159b8a20125f7a9cc055a1b82aa8f45249507a4c6d40398aa","title":"ISN 2025-24: Befehlsausführung in IGEL OS","path":"/de/security-safety/current/isn-2025-24-command-execution-in-igel-os","children":[]},{"id":"ci_e4adefdc191ae6a8effb4e596d4bd6a4b8c4aba609bee21092a643ed6bfc966d","title":"ISN 2025-23: Chromium-Sicherheitslücke wird aktiv ausgenutzt","path":"/de/security-safety/current/isn-2025-23-chromium-vulnerability-exploited-in-th","children":[]},{"id":"ci_359c882a8c85919f6f1bfc21e8ecc58ede60d1299a7cd35fc58b08efd6242b0c","title":"ISN 2025-22: Stellungnahme zu CVE-2025-47827 in IGEL OS 10","path":"/de/security-safety/current/isn-2025-22-statement-on-cve-2025-47827-in-igel-os","children":[]},{"id":"ci_0f8e9c15a012f5cbd89b7bb1b30bc1f6e81804421832910f99363133ed75157b","title":"ISN 2025-21: Sicherheitslücke in Glibc","path":"/de/security-safety/current/isn-2025-21-glibc-vulnerability","children":[]},{"id":"ci_55e88868b9a42d04b9167744692e64068713edcb574109d53521d16f0c8eeced","title":"ISN 2025-20: Kritische Sicherheitslücken in Firefox ESR","path":"/de/security-safety/current/isn-2025-20-critical-firefox-esr-vulnerabilities","children":[]},{"id":"ci_d08861e0dd96f693bb3bc947177d1d82dcf328fd3d0789219da64f5cd06921bb","title":"ISN 2025-19: Chromium-Sicherheitslücke wird aktiv ausgenutzt","path":"/de/security-safety/current/isn-2025-19-chromium-vulnerability-exploited-in-th","children":[]},{"id":"ci_5a9f0c66bd17e0964c10f0e26f263c9038db98577497bc7eac81e0d56b7787e7","title":"ISN 2025-18: Kritische Sicherheitslücke in Libsoup","path":"/de/security-safety/current/isn-2025-18-critical-libsoup-vulnerability","children":[]},{"id":"ci_1bd28ca0fb75ba17e1794f87a3895513d69c7de343199ce484abee7337b13ec6","title":"ISN 2025-17: Sicherheitslücke im NVIDIA-Grafiktreiber","path":"/de/security-safety/current/isn-2025-17-vulnerability-in-nvidia-graphics-drive","children":[]},{"id":"ci_811dd0e178e1b04198d55c79c5de0b2c2be139f50b596308c3e9e97d851fb130","title":"[KORRIGIERT] ISN 2025-16: Kritische Sicherheitslücke in Ppp","path":"/de/security-safety/current/isn-2025-16-critical-vulnerability-in-ppp","children":[]},{"id":"ci_7db4fe9ccd34a8ec68247f9ee9b027f3efbfe9eceed58df413978698ca7281b4","title":"ISN 2025-15: Sicherheitslücke in Perl","path":"/de/security-safety/current/isn-2025-15-perl-vulnerability","children":[]},{"id":"ci_655649154254a747fd93bd89edec8de9d4c1a0970516e8e07677e1890c2d7e63","title":"ISN 2025-14: Kritische Privilegieneskalation in IGEL OS","path":"/de/security-safety/current/isn-2025-14-critical-igel-os-privilege-escalation","children":[]},{"id":"ci_fc9868ecdb14f652a8c255436ac67239e3f8b3400cf5d6e23a67b11cb84ff6a1","title":"ISN 2025-13: Kritische Sicherheitslücke in Chromium","path":"/de/security-safety/current/isn-2025-13-chromium-critical-vulnerability","children":[]},{"id":"ci_576eb8d99b04df8c2e4a2ec10133134f29dc1d8e93dce3c6674a1a9c8c7dcb20","title":"ISN 2025-12: Kritische Sicherheitslücke in Chromium","path":"/de/security-safety/current/isn-2025-12-chromium-critical-vulnerability","children":[]},{"id":"ci_7e85264fe8b5749c89ad55c79757b7494e5083cf8c79f53abd2e770587defc70","title":"ISN 2025-10: Sicherheitslücke im Linux-Kernel","path":"/de/security-safety/current/isn-2025-10-linux-kernel-vulnerability","children":[]},{"id":"ci_de4acb8bc1f2341a05350dafc73643211f4d2e4f14406dbd50118a18808a79a3","title":"ISN 2025-09: Sicherheitslücken in Firefox ESR","path":"/de/security-safety/current/isn-2025-09-firefox-esr-vulnerabilities","children":[]},{"id":"ci_b5bc74b3bc15566fc24070a67bb75e4fddac001bf50399c74495bf235d811c9d","title":"ISN 2025-08: Sicherheitslücken in Libxml2","path":"/de/security-safety/current/isn-2025-08-libxml2-vulnerabilities","children":[]},{"id":"ci_128c034de383c883560c23fbae71c57f25cc57890f2d8d9c00154ceccf6706da","title":"ISN 2025-07: Sicherheitslücken in X.org","path":"/de/security-safety/current/isn-2025-07-x-org-vulnerabilities","children":[]},{"id":"ci_59c7ad969aef18e2f4ff3d72956aff4f332929b11d690d156999690d824bf1c4","title":"ISN 2025-06: Kritische Sicherheitslücke in Webkit","path":"/de/security-safety/current/isn-2025-06-critical-webkit-vulnerability","children":[]},{"id":"ci_033dade1b1385717b415cd44c8244da2aa6341e5392bef2449e11b625bd4d7b5","title":"ISN 2025-05: Sicherheitslücke in HP Anyware","path":"/de/security-safety/current/isn-2025-05-hp-anyware-vulnerability","children":[]},{"id":"ci_3ffcb30b9e7ac160ebf9aa47d57570f2704d48c9196a7a1cb0035d070ddb70ec","title":"ISN 2025-04: Sicherheitslücke in Microsoft Edge","path":"/de/security-safety/current/isn-2025-04-microsoft-edge-vulnerabilities","children":[]},{"id":"ci_57a671e5cfe15356856cbdd70da8465760592d5b552df3cddefb131d08cfd762","title":"ISN 2025-03: Sicherheitslücken in Gstreamer","path":"/de/security-safety/current/isn-2025-03-gstreamer-vulnerabilities","children":[]},{"id":"ci_d7ab87b9d63e9ed78d2cffe20d847c9327e5314abb748b5fd21bf94d33fbb452","title":"ISN 2025-02: Sicherheitslücken in Chromium","path":"/de/security-safety/current/isn-2025-02-chromium-vulnerabilities","children":[]},{"id":"ci_5cf0dd16259fb7f1d482cc965c0e11ab04db35716f3f2872c016785ba5a460e5","title":"ISN 2025-01: Sicherheitslücken in Firefox ESR","path":"/de/security-safety/current/isn-2025-01-firefox-esr-vulnerabilities","children":[]},{"id":"ci_9a7e376f0fc38943fea25c2341b3ebbd77fc34ff929fae1529ce8f07c65eb988","title":"ISN 2024-24: Sicherheitslücke in Chromium","path":"/de/security-safety/current/isn-2024-24-chromium-vulnerability","children":[]},{"id":"ci_e59c408e57b715ae34c3416651be8606d432feac40e00dff0e59eb76cc9a5547","title":"ISN 2024-23: Kritische Sicherheitslücke in Webkit2GTK","path":"/de/security-safety/current/isn-2024-23-webkit2gtk-critical-vulnerability","children":[]},{"id":"ci_3a1708c627f10fb9a710e841013b70cb02f574d70a6f8895cc79cfd9e3a6bb32","title":"ISN 2024-22: Sicherheitslücken in Firefox ESR","path":"/de/security-safety/current/isn-2024-22-firefox-esr-vulnerabilities","children":[]},{"id":"ci_72d9cfa868c00d015cd00f3b6ddc49a420c86263544ffc4ba923b9ad597f5aff","title":"ISN 2024-21: Kritische Sicherheitslücke in Chromium","path":"/de/security-safety/current/isn-2024-21-chromium-critical-vulnerability","children":[]},{"id":"ci_00594ae9c208931ae3c784a54404000901905cc3ef932f1f7253c37e7bb56e46","title":"ISN 2024-20: Sicherheitslücken in Chromium","path":"/de/security-safety/current/isn-2024-20-chromium-vulnerabilities","children":[]},{"id":"ci_d2126aa3d88c6d5cfa8dace6dc5e7346afa6f774a93e42b5f7c8941b454e7772","title":"ISN 2024-19: Sicherheitslücken in CUPS","path":"/de/security-safety/current/isn-2024-19-cups-vulnerabilities","children":[]},{"id":"ci_420b27f84915ba7eef5a23ad490385efc5cd66c12f3053afe960d9af2e9ea418","title":"ISN 2024-18: Kritische Sicherheitslücke in Firefox ESR","path":"/de/security-safety/current/isn-2024-18-critical-firefox-esr-vulnerability","children":[]},{"id":"ci_47be99bea62364b2c411e624b326daf091b3db848452a03efa51a6badfe5f388","title":"ISN 2024-17: Sicherheitslücke in OpenSSH","path":"/de/security-safety/current/isn-2024-17-openssh-vulnerability","children":[]},{"id":"ci_3bc1acdd9ea67249e1abcb3baa2cbc9bd69c27fd39e1f68aedb68ee3fce8f254","title":"ISN 2024-16: Sicherheitslücke in Libarchive","path":"/de/security-safety/current/isn-2024-16-libarchive-vulnerability","children":[]},{"id":"ci_555721b7b95178db157b2a229e4975f5f7d57f3fd6aa3688f87175dbba7cbeca","title":"ISN 2024-15: Sicherheitslücke in Libaom","path":"/de/security-safety/current/isn-2024-15-libaom-vulnerability","children":[]},{"id":"ci_20f7b21711f3047492e299a4acd2c582bf09c9e3debec19608739d3a25086103","title":"ISN 2024-14: Sicherheitslücken in Chromium","path":"/de/security-safety/current/isn-2024-14-chromium-vulnerabilities","children":[]},{"id":"ci_77df30bccb5ab76ef0477e5616fb7f1b2bff6648c22ae8f44743b513811c79fc","title":"ISN 2024-13: Sicherheitslücken in Firefox ESR","path":"/de/security-safety/current/isn-2024-13-firefox-esr-vulnerabilities","children":[]},{"id":"ci_19987f1abd0f48755ff15cd49bf15e61510c73be9d6e7e185b84734a123db2a0","title":"ISN 2024-12: Sicherheitslücke in der Starter Lizenzprüfung","path":"/de/security-safety/current/isn-2024-12-vulnerability-in-starter-license-verif","children":[]},{"id":"ci_6d2a1daf15c5f986d2ba8035c647bfdaefd824b8453feded398531f311a46a53","title":"ISN 2024-11: Kritische Sicherheitslücke in Chromium","path":"/de/security-safety/current/isn-2024-11-chromium-critical-vulnerability","children":[]},{"id":"ci_44c29dbc9f2f95e562838a516068d5d9360f6df09662e3433b6ec6a0eb26563a","title":"ISN 2024-10: Kritische Sicherheitslücke in Chromium","path":"/de/security-safety/current/isn-2024-10-chromium-critical-vulnerability","children":[]},{"id":"ci_82f1f2acf084defbbb3c37433c87e98962ba27e7b09340e69bc4e43aedb0c0a7","title":"ISN 2024-09: Sicherheitslücke in Xdg-open „Öffnen mit“","path":"/de/security-safety/current/isn-2024-09-xdg-open-open-with-vulnerability","children":[]},{"id":"ci_01b655a950a0da385ce3be0c9417aa5332d508df2f2b4957e86389be1cff781c","title":"ISN 2024-08: Sicherheitslücken in Firefox ESR","path":"/de/security-safety/current/isn-2024-08-firefox-esr-vulnerabilities","children":[]},{"id":"ci_1de7f18c8400d081717c033e6300fc00d2a5186f8b650de5d5ab89c0c18bf8f1","title":"ISN 2024-07: Sicherheitslücken in Chromium","path":"/de/security-safety/current/isn-2024-07-chromium-vulnerabilities","children":[]},{"id":"ci_639496c6021303c175ff954a1afc4bfe85b921bc02306bc71a687a312b03d9a0","title":"ISN 2024-06: Kernel Sicherheitslücken in OS 11","path":"/de/security-safety/current/isn-2024-06-os-11-kernel-vulnerabilities","children":[]},{"id":"ci_9ec5a4b5b98c073bcd688959a05d13545dc3ac4410d15c8d7b3fe4ebca71b581","title":"ISN 2024-05: Kernel-Sicherheitslücken in OS 12","path":"/de/security-safety/current/isn-2024-05-os-12-kernel-vulnerability","children":[]},{"id":"ci_dc9fd4663c7d74e8773d4f1ae04c71f0006f3a78c312c595c5d2e7ebf7ec3c49","title":"ISN 2024-04: Sicherheitslücke in Libuv","path":"/de/security-safety/current/isn-2024-04-libuv-vulnerability","children":[]},{"id":"ci_46dadd7ec5aa6c603eeb16a7bf2ae24bd0964d643b0a656e480c4bcc2a5019c0","title":"ISN 2024-03: Sicherheitslücken in Firefox ESR","path":"/de/security-safety/current/isn-2024-03-firefox-esr-vulnerabilities","children":[]},{"id":"ci_3001312b765fcb53f4f771a0ec2c8c9834e51a0e704924b03117be6627f44c20","title":"ISN 2024-02:  Sicherheitslücken in X.org","path":"/de/security-safety/current/isn-2024-02-x-org-vulnerabilities","children":[]},{"id":"ci_99f2b1a141bb91ca491ad84b1085378c6a9efb8f8dcb0c5de755ac4350c81dd3","title":"ISN 2024-01: Sicherheitslücken in Chromium","path":"/de/security-safety/current/isn-2024-01-chromium-vulnerabilities","children":[]},{"id":"ci_4d3c0966aa7253e5a39d8e9396a3aeb04e759866f367880795fe19d86536e4f0","title":"ISN 2023-39: SSH Terrapin Vulnerability","path":"/de/security-safety/current/isn-2023-39-ssh-terrapin-vulnerability","children":[]},{"id":"ci_7418b8f9856d7352bba555926ca5818150294674ccffe3db88228ad187917959","title":"ISN 2023-38: X.org Vulnerabilities","path":"/de/security-safety/current/isn-2023-38-x-org-vulnerabilities","children":[]},{"id":"ci_0ea6d7d9cef68d9a5818cc4a4568071dde297c5c778eb4240a3681028e34cf90","title":"ISN 2023-36: BlueZ Vulnerability","path":"/de/security-safety/current/isn-2023-36-bluez-vulnerability","children":[]},{"id":"ci_ef244de540349afb1bf714d9c87f281cfe8053a53d040cc4acdcbec3d32db5d3","title":"ISN 2023-35: GIMP Vulnerabilities","path":"/de/security-safety/current/isn-2023-35-gimp-vulnerabilities","children":[]},{"id":"ci_f107366ea86befaad35aa9d12e67529f11fcca48017f4209605bf428d28d3f8f","title":"ISN 2023-34: Perl Vulnerabilities","path":"/de/security-safety/current/isn-2023-34-perl-vulnerabilities","children":[]},{"id":"ci_f6a9f7f65f116500df22db06e612284cb05a6a0361bd1b7db2a0cf3f1ca369d0","title":"ISN 2023-33: Zlib Vulnerability","path":"/de/security-safety/current/isn-2023-33-zlib-vulnerability","children":[]},{"id":"ci_d08428e51703963ea9c675c298f6971625854368e664116a99198d65be4d36d1","title":"ISN 2023-32: Chromium Vulnerabilities","path":"/de/security-safety/current/isn-2023-32-chromium-vulnerabilities","children":[]},{"id":"ci_a9baf1737c6b53f6d509282d1d54f7fcdc9638d40d0a00d0da88c7e4ca0ad394","title":"ISN 2023-31: Webkit Vulnerabilities","path":"/de/security-safety/current/isn-2023-31-webkit-vulnerabilities","children":[]},{"id":"ci_475ea0ebdfce8d81c3aaae0d6fed00ec0b876d8acae5c0ee939e67bd987be04d","title":"ISN 2023-30: Ffmpeg Vulnerabilities","path":"/de/security-safety/current/isn-2023-30-ffmpeg-vulnerabilities","children":[]},{"id":"ci_c1f529f4d69b00ae80aa84c1171b7af60f367e06d4fabfd907dde9d3a353a9e9","title":"ISN 2023-29: Chromium Vulnerabilities","path":"/de/security-safety/current/isn-2023-29-chromium-vulnerabilities","children":[]},{"id":"ci_5a61334ab7a48f6d2527782a04f9912558c23edff823138e2d0d94e4def15f5b","title":"ISN 2023-28: Firefox ESR Vulnerabilities","path":"/de/security-safety/current/isn-2023-28-firefox-esr-vulnerabilities","children":[]},{"id":"ci_3b58dc527ce0e3848a4672c3b511dd449faf7481e3d8ca5921adeb818ad04a1d","title":"ISN 2023-27: ActiveMQ in UMS HA","path":"/de/security-safety/current/isn-2023-27-activemq-in-ums-ha","children":[]},{"id":"ci_a760d0b3227ae48c1dce1065c905e2d5e87228db017ee9991dabdcdc4ee5c8e7","title":"ISN 2023-26: X.org Vulnerabilities","path":"/de/security-safety/current/isn-2023-26-x-org-vulnerabilities","children":[]},{"id":"ci_b70f3bf92c3bc424eb35358d856a909474ee98721c7c6d6c7b2d1a4156567517","title":"ISN 2023-25: Webkit Vulnerabilities","path":"/de/security-safety/current/isn-2023-25-webkit-vulnerabilities","children":[]},{"id":"ci_18fe654c04f21f4fa9ab51a9ee4326ee0f335c26fbbe09540d295b5d8cf27148","title":"ISN 2023-24: Chromium Vulnerability","path":"/de/security-safety/current/isn-2023-24-chromium-vulnerability","children":[]},{"id":"ci_5b44fe9de1d61a4502a360e598746c5b47743b1e0fbfb5dd6cf89253aab65227","title":"ISN 2023-23: Curl Vulnerability","path":"/de/security-safety/current/isn-2023-23-curl-vulnerability","children":[]},{"id":"ci_86005562c94a91dbb71fe91715eef4098a126aec346a0b01098f3cdde30b03dd","title":"ISN 2023-22: Multiple X11 Vulnerabilites","path":"/de/security-safety/current/isn-2023-22-multiple-x11-vulnerabilites","children":[]},{"id":"ci_8e710bce1ac1683bfce8556ee2cab2cf0dbc6d643d001e5fef1b7bb46f46506f","title":"ISN 2023-21: Libvpx Vulnerability in Chromium and Firefox","path":"/de/security-safety/current/isn-2023-21-libvpx-vulnerability-in-chromium-and-f","children":[]},{"id":"ci_659e2a211bf11271df80ebf7a8237d186149a07e43d6886903085ba6aa6f8229","title":"ISN 2023-20: Firefox Libwebp Vulnerability","path":"/de/security-safety/current/isn-2023-20-firefox-libwebp-vulnerability","children":[]},{"id":"ci_dc475388b1b31627164c1005f60ec1cc4e49eeb01ab539dca83f6ddcd224114a","title":"ISN 2023-19: Libwebp Vulnerability in Chromium and Other Software","path":"/de/security-safety/current/isn-2023-19-libwebp-vulnerability-in-chromium-and-","children":[]},{"id":"ci_237e751ee34a491b481a514864c2f773c841ccfa3ea51cb39bfffa095a39c6fe","title":"ISN-2023-18: SnakeYAML Vulnerability","path":"/de/security-safety/current/isn-2023-18-snakeyaml-vulnerability","children":[]},{"id":"ci_27e3cdfdd013d55ebedcbce01f5313c8cf31ef5dca042cfaa457150a91fba8df","title":"ISN 2023-17: AMD Inception CPU Vulnerability","path":"/de/security-safety/current/isn-2023-17-amd-inception-cpu-vulnerability","children":[]},{"id":"ci_c1a8ffe108cd63d51b1f4828b91fa72232eb529139974c9f0a85880f83eac8ec","title":"ISN 2023-16: Intel Downfall CPU Vulnerability","path":"/de/security-safety/current/isn-2023-16-intel-downfall-cpu-vulnerability","children":[]},{"id":"ci_2bfd8048b7d930a38bee213f61b23ac96179c041a2e0320fabe3e92366a12f9d","title":"ISN 2023-15: ZenBleed Vulnerability","path":"/de/security-safety/current/isn-2023-15-zenbleed-vulnerability","children":[]},{"id":"ci_132a9df14039a6f10a942304e1e70a5790a71e288dc19acff6b35f3842817f65","title":"ISN 2023-14: IGEL OS OpenSSH Vulnerability","path":"/de/security-safety/current/isn-2023-14-igel-os-openssh-vulnerability","children":[]},{"id":"ci_13fa9e531eec297a7cdcf91795e4bca83393599c4d8a674c1e6687459c73130f","title":"ISN 2023-13: IGEL OS Ghostscript Vulnerability","path":"/de/security-safety/current/isn-2023-13-igel-os-ghostscript-vulnerability","children":[]},{"id":"ci_a4951c20253be20d8ebe750565008790ff48967d059aa154e9675507406bd4c1","title":"ISN 2023-12: Citrix Secure Access Client","path":"/de/security-safety/current/isn-2023-12-citrix-secure-access-client","children":[]},{"id":"ci_02704c72cefd6314cdba0c947d5c50c68395b69ae3c94c50f21ccfcfa3c42fa8","title":"ISN 2023-11: “StackRot” in IGEL OS Kernel","path":"/de/security-safety/current/isn-2023-11-stackrot-in-igel-os-kernel","children":[]},{"id":"ci_4338807c0b926f50365804d7085ccd7ca6f58427c8e7bd1a298219ce31f3f260","title":"ISN 2023-10: Log4j 1.x in IBM i Access Client","path":"/de/security-safety/current/isn-2023-10-log4j-1-x-in-ibm-i-access-client","children":[]},{"id":"ci_5a1025617e8fe32af9ef6fae3d58b7f88cf0217ab7e361b222872456f5723ffd","title":"ISN 2023-09: RCE in CUPS Printing System","path":"/de/security-safety/current/isn-2023-09-rce-in-cups-printing-system","children":[]},{"id":"ci_7b12fbe205b06e4fb872710d352cc8933b41b14dc31b13c1c45d64bcfe05db0b","title":"ISN 2023-08: Chromium Critical Vulnerability","path":"/de/security-safety/current/isn-2023-08-chromium-critical-vulnerability","children":[]},{"id":"ci_a2c9e723f1966f5ff48fd42345eed8bae052c4cc895585e4fe3bad406f77c7a6","title":"ISN 2023-07: Device Encryption Password Bug","path":"/de/security-safety/current/isn-2023-07-device-encryption-password-bug","children":[]},{"id":"ci_87597738bf31dd0bc47437ee63c528b48719aa7051df56858dd06c117ca82968","title":"ISN 2023-06: UEFI Secure Boot Malware and IGEL OS","path":"/de/security-safety/current/isn-2023-06-uefi-secure-boot-malware-and-igel-os","children":[]},{"id":"ci_3e0dd81a4f0fd8f6d10e69491011e42f81ac3795aed4f213b50e26107ba6a502","title":"ISN 2023-05: Chromium Local File Access","path":"/de/security-safety/current/isn-2023-05-chromium-local-file-access","children":[]},{"id":"ci_89cace20a13ec13a1ec888330d7de9cb92e7ec71de623ff8200fc2e7f4c59679","title":"ISN 2023-04: IGEL OS Local Privilege Escalation","path":"/de/security-safety/current/isn-2023-04-igel-os-local-privilege-escalation","children":[]},{"id":"ci_051b4f82e3bed354c82d0a9b8a9cd46e52e61637abbea41d7b4cd90c2efd14e3","title":"ISN 2023-03: Chromium Vulnerabilities","path":"/de/security-safety/current/isn-2023-03-chromium-vulnerabilities","children":[]},{"id":"ci_e8557f72b45df405b78b5a4aad5b57ccaf1e968ea0bf41daa1d57995ba661f6b","title":"ISN 2023-02: Firefox ESR Vulnerabilities","path":"/de/security-safety/current/isn-2023-02-firefox-esr-vulnerabilities","children":[]},{"id":"ci_7c22f977aa904f1e03098ae7f5f0b517acf4dbad554f1fd8c9e96f50518478eb","title":"ISN 2023-01: Citrix Workspace App Vulnerability","path":"/de/security-safety/current/isn-2023-01-citrix-workspace-app-vulnerability","children":[]},{"id":"ci_21472139999103f4d016b2ea04318fefb0606fa2f9e890df3a8b73b5d42388ff","title":"ISN 2022-21: Chromium Vulnerability","path":"/de/security-safety/current/isn-2022-21-chromium-vulnerability","children":[]},{"id":"ci_036b2cf7faf50b941fdc210e1a7681cc870ec24026b1ea5ddca2719c7a1ba3f6","title":"ISN 2022-20: Firefox ESR Vulnerabilities","path":"/de/security-safety/current/isn-2022-20-firefox-esr-vulnerabilities","children":[]},{"id":"ci_57eeec97178b621872a3af0006fd2ccb0bde881409924379af71c0e8881fdc89","title":"ISN 2022-19: Log4j 1.x Remainder in UMS","path":"/de/security-safety/current/isn-2022-19-log4j-1-x-remainder-in-ums","children":[]},{"id":"ci_d797c92c4309d0409a39f349d3f91fd4ed2935b324343def21e6637d805837d0","title":"ISN 2022-18: Linux Kernel Vulnerability","path":"/de/security-safety/current/isn-2022-18-linux-kernel-vulnerability","children":[]},{"id":"ci_65adb04819484ae5e6b1217f19be0d8533eabc9a3a5b94fdc99841be626279e4","title":"ISN 2022-17: Chromium WebRTC Vulnerability","path":"/de/security-safety/current/isn-2022-17-chromium-webrtc-vulnerability","children":[]},{"id":"ci_5d6281b66cf70ce857b54755efc556f06dd737f96defaa9e6b2302643d95bb32","title":"ISN 2022-16: Firefox Vulnerabilities","path":"/de/security-safety/current/isn-2022-16-firefox-vulnerabilities","children":[]},{"id":"ci_f7e015a35c651fbc0af087ce1689ec1a3da730168ac1ac4a2a972d13debb95da","title":"ISN 2022-15: Chromium Browser Vulnerabilities","path":"/de/security-safety/current/isn-2022-15-chromium-browser-vulnerabilities","children":[]},{"id":"ci_ffe617926ce1edf66886a287e7b8a54534e42051bdd2605907080e5298f2d709","title":"ISN 2022-14: Chromium Browser Vulnerabilities","path":"/de/security-safety/current/isn-2022-14-chromium-browser-vulnerabilities","children":[]},{"id":"ci_d96e0f8572919cdd5d8d19391b2dc56cbdb8e5f93524e9fe5a73a4a5c9744766","title":"ISN 2022-13: UMS Vulnerabilities","path":"/de/security-safety/current/isn-2022-13-ums-vulnerabilities","children":[]},{"id":"ci_8e86288d083492131d1fd8aa06fc6a64b463cd5e789bae38b3d7cb3072d5ee3f","title":"ISN 2022-12: Teradici PCoIP Library Vulnerabilities","path":"/de/security-safety/current/isn-2022-12-teradici-pcoip-library-vulnerabilities","children":[]},{"id":"ci_128be6b18193321d41285ffcd31511e4899fa6ed3b2c40c617189f89a9c4877a","title":"ISN 2022-11: VMware Horizon Privilege Escalation","path":"/de/security-safety/current/isn-2022-11-vmware-horizon-privilege-escalation","children":[]},{"id":"ci_f5f448bec3583d2b88f72ce0caacb68dd46bf39be02fea28736604db74359052","title":"ISN 2022-10: Firefox Vulnerabilities","path":"/de/security-safety/current/isn-2022-10-firefox-vulnerabilities","children":[]},{"id":"ci_d2609c690024cd9600d83eb403f5a5d270b27d884c66d01ec34384e349110d8c","title":"ISN 2022-09: Zlib Vulnerability","path":"/de/security-safety/current/isn-2022-09-zlib-vulnerability","children":[]},{"id":"ci_979c5175792e4dc239336ebadf3579f6114d2f47e56a4476b5c7bab00503abf4","title":"ISN 2022-08: Chromium JavaScript Vulnerability","path":"/de/security-safety/current/isn-2022-08-chromium-javascript-vulnerability","children":[]},{"id":"ci_99758a0ec9bbdc58ef4e9bb348713c53345cbe2c4e9cdcbfab0256d4137ebcc4","title":"ISN 2022-07: Chromium Browser Vulnerabilities","path":"/de/security-safety/current/isn-2022-07-chromium-browser-vulnerabilities","children":[]},{"id":"ci_e13fe7fb37c8b05c9718243dbfca229efb09bf95d0bfbb180dc7807c737d50f6","title":"ISN 2022-06: OpenSSL Denial of Service","path":"/de/security-safety/current/isn-2022-06-openssl-denial-of-service","children":[]},{"id":"ci_6d95b73205f1eca86caf530d5daf5f2b4cca02c045ad760a41a2211bf7cd76da","title":"ISN 2022-05: Netfilter Escalation of Privilege","path":"/de/security-safety/current/isn-2022-05-netfilter-escalation-of-privilege","children":[]},{"id":"ci_04277ee91004b705c764adcd81a8408ad26e07f713c729d36be8ce85944db5ee","title":"ISN 2022-04: Dirty Pipe Escalation of Privilege","path":"/de/security-safety/current/isn-2022-04-dirty-pipe-escalation-of-privilege","children":[]},{"id":"ci_80b556bfa42a07325804aa2ec454e5b2f0519fe3bc677926ad54889b6fd67d02","title":"ISN 2022-03: Glibc Denial of Service in IGEL OS","path":"/de/security-safety/current/isn-2022-03-glibc-denial-of-service-in-igel-os","children":[]},{"id":"ci_bceefdbc117fb845c7ac208f882b5043a790647a6a343d28285bc04617d45965","title":"ISN 2022-02: UEFI Vulnerabilities in UD Devices","path":"/de/security-safety/current/isn-2022-02-uefi-vulnerabilities-in-ud-devices","children":[]},{"id":"ci_2351dc34acde9ac7f4c5fcb5675c6e661aa8020a8e3a86bb181960cf3accdb7f","title":"ISN 2022-01: Polkit Escalation of Privilege","path":"/de/security-safety/current/isn-2022-01-polkit-escalation-of-privilege","children":[]},{"id":"ci_080b186dd3d6729173177ada9ac6c9cbb211eb0e57d2e29cf5339340970c285e","title":"ISN 2021-11: UMS Log4j Vulnerability","path":"/de/security-safety/current/isn-2021-11-ums-log4j-vulnerability","children":[]},{"id":"ci_0a481dbfe61c509acc992c032195355a14a23a755d7aec80558dabfa5c6add5f","title":"ISN 2021-10: Chromium vulnerabilities","path":"/de/security-safety/current/isn-2021-10-chromium-vulnerabilities","children":[]},{"id":"ci_a0f7f68f29b8d67a4de1a9c191793d48ddc0fe84a84432cc57516a8781c66e49","title":"ISN 2021-09: Firefox ESR vulnerabilities","path":"/de/security-safety/current/isn-2021-09-firefox-esr-vulnerabilities","children":[]},{"id":"ci_8d2ab510050dbe9abd4d0d3212ce135c3b56b6b4a85bcc058b71787103e17d89","title":"ISN 2021-08: ICG Authentication Vulnerability","path":"/de/security-safety/current/isn-2021-08-icg-authentication-vulnerability","children":[]},{"id":"ci_abbaff60966255044ff02d81fefcaf1ceba100b980c497aa4e93ff227b866bb7","title":"ISN 2021-07: UMS Web App Information Disclosure","path":"/de/security-safety/current/isn-2021-07-ums-web-app-information-disclosure","children":[]},{"id":"ci_8e4fd4a836d0c3da10c41a2d88cbc2b98d2d804058e29e30ceba815d59782a9e","title":"ISN 2021-06: IGEL OS OpenSSH Vulnerabilities","path":"/de/security-safety/current/isn-2021-06-igel-os-openssh-vulnerabilities","children":[]},{"id":"ci_361cbdc412e562ca605a332f0686c22e148c17d8b89896f8f62dc7181c8102f8","title":"ISN 2021-05: IGEL OS Denial of Service","path":"/de/security-safety/current/isn-2021-05-igel-os-denial-of-service","children":[]},{"id":"ci_197977fa256200786e2d9f5f56fb555109054359c7112c75d8e140d308ee6151","title":"ISN 2021-04: IGEL OS Kernel Privilege Escalation","path":"/de/security-safety/current/isn-2021-04-igel-os-kernel-privilege-escalation","children":[]},{"id":"ci_7e1f159cc871cac1ac57cc90eddf940a42370fe686908910aa374fcd0f9f3ab3","title":"ISN 2021-03: IGEL W10 Print Spooler Vulnerability","path":"/de/security-safety/current/isn-2021-03-igel-w10-print-spooler-vulnerability","children":[]},{"id":"ci_27a112ed80342af745cc93e17b72ced6a84f5800437ebbad0ed6cac3b2769aed","title":"ISN 2021-02: IGEL OS and W10 Wi-Fi Vulnerabilities (Fragattacks)","path":"/de/security-safety/current/isn-2021-02-igel-os-and-w10-wi-fi-vulnerabilities-","children":[]},{"id":"ci_8ec8ea218407a261226de76cd163adc1415f73228e2cb2aa598ff7c76785fe9e","title":"ISN 2021-01: IGEL OS Remote Command Execution Vulnerability","path":"/de/security-safety/current/isn-2021-01-igel-os-remote-command-execution-vulne","children":[]},{"id":"ci_db763b4581ef0a3cf5cb7f45ba35846a2b71e1cfce40642294d3ea17ab1b02cb","title":"ISN 2020-10: IGEL OS Bluetooth Vulnerabilities","path":"/de/security-safety/current/isn-2020-10-igel-os-bluetooth-vulnerabilities","children":[]},{"id":"ci_cf8da6d8b493792235832d594842e24ce51bc5fc6d2defb3dc5d555e33e73e27","title":"ISN 2020-09: Command Execution from Start Menu","path":"/de/security-safety/current/isn-2020-09-command-execution-from-start-menu","children":[]},{"id":"ci_bc3b23efd8491ef9318ba02e8e6c620e9ce8f9f209d0f020a63ab0bf44985598","title":"ISN 2020-08: Firefox ESR Various Vulnerabilities","path":"/de/security-safety/current/isn-2020-08-firefox-esr-various-vulnerabilities","children":[]},{"id":"ci_e77ce34b09b2f3680444b1d8b4986321fe4b8d97d8e1e3b65ac01fb3b37fcb84","title":"ISN 2020-07: Firefox ESR Various Vulnerabilities","path":"/de/security-safety/current/isn-2020-07-firefox-esr-various-vulnerabilities","children":[]},{"id":"ci_8c7650bdccafc1354c7caa8d668cfd783ac3e3633db250a93a59614ca588d8ff","title":"ISN 2020-06: IGEL Cloud Gateway (ICG) Various Vulnerabilities","path":"/de/security-safety/current/isn-2020-06-igel-cloud-gateway-icg-various-vulnera","children":[]},{"id":"ci_7e4bb460082febe7f932d99ad7360b0e05189873647801f2a9f5c7589b51495a","title":"ISN 2020-05: Intel Chipset Vulnerabilities","path":"/de/security-safety/current/isn-2020-05-intel-chipset-vulnerabilities","children":[]},{"id":"ci_989aad3feef1911988bd60a2fbd59e12fa673c42545ab74b0b6fd050d6785644","title":"ISN 2020-04: Firefox ESR Various Vulnerabilities","path":"/de/security-safety/current/isn-2020-04-firefox-esr-various-vulnerabilities","children":[]},{"id":"ci_c5d243f7da0ae9f01e483221337cee5b2d7db7e6d8f864e0e4c3622c9f12bf61","title":"ISN 2020-03: Firefox ESR Vulnerabilities","path":"/de/security-safety/current/isn-2020-03-firefox-esr-vulnerabilities","children":[]},{"id":"ci_114c2cf26596a75e74c86fd998f31d8cb8a61a9af8ba6d8310c5b2ff0eae8b22","title":"ISN 2020-02: Windows CryptoAPI Spoofing Vulnerability","path":"/de/security-safety/current/isn-2020-02-windows-cryptoapi-spoofing-vulnerabili","children":[]},{"id":"ci_c0d22fbe973c84c740b6436cc0a026f7a7fbf8fc776098bf0f9d2888c3734f88","title":"ISN 2020-01: Firefox ESR Vulnerability","path":"/de/security-safety/current/isn-2020-01-firefox-esr-vulnerability","children":[]},{"id":"ci_f5d1fe7844ba1496ee9464edafe1b1a17a0cba5500a3ef79d776b10eb5c1cefb","title":"ISN-2019-13: Windows Defender","path":"/de/security-safety/current/isn-2019-13-windows-defender","children":[]},{"id":"ci_7fe347577cad1d8e53b3b17bbc1da4ec76c17c1a1329ca06c7f7a63032588454","title":"ISN-2019-12: Internet Explorer Vulnerability","path":"/de/security-safety/current/isn-2019-12-internet-explorer-vulnerability","children":[]},{"id":"ci_be7891a5954226141b356a97e9c5fa90096eedeaf8819a47302f569275234ca6","title":"ISN 2019-11: Firefox ESR Vulnerabilities","path":"/de/security-safety/current/isn-2019-11-firefox-esr-vulnerabilities","children":[]},{"id":"ci_75fc571c62097148e97733fa95d9e28fc6f1af23f0a218ac33fa97729f7f2e8e","title":"ISN 2019-10: Spectre SWAPGS CPU Vulnerability","path":"/de/security-safety/current/isn-2019-10-spectre-swapgs-cpu-vulnerability","children":[]},{"id":"ci_731536e433313b2bca82ddf47e2b4495d9222af101a8ba0ba3b8d336a6931244","title":"ISN 2019-09: IGEL OS SWP Vulnerability","path":"/de/security-safety/current/isn-2019-09-igel-os-swp-vulnerability","children":[]},{"id":"ci_270ee6ff535d34172e3238f25a58ab4abe8939ecd12295a2cc9e9f944986913c","title":"ISN 2019-08: Firefox ESR Vulnerabilities","path":"/de/security-safety/current/isn-2019-08-firefox-esr-vulnerabilities","children":[]},{"id":"ci_7e871d3a01423be64c5cef37039857f6b19020a8f57e6f1712ac2f67a952a00f","title":"ISN 2019-07: Firefox ESR Vulnerability","path":"/de/security-safety/current/isn-2019-07-firefox-esr-vulnerability","children":[]},{"id":"ci_4344f04fee0b5d94ab7fab3901cb38cb7a8189a3faa51fdb4a5c3636a964e104","title":"ISN 2019-06: IGEL OS Kernel Vulnerability","path":"/de/security-safety/current/isn-2019-06-igel-os-kernel-vulnerability","children":[]},{"id":"ci_5261013eff75dae69641a488fbe6dec306ed6a585688c825d18cc9d330114131","title":"ISN 2019-05: UMS HA Vulnerability","path":"/de/security-safety/current/isn-2019-05-ums-ha-vulnerability","children":[]},{"id":"ci_23e704b9b26d8690ce2474cb7bab3eb9ca773261c8e1ed0d5b5e8c8a9d38a605","title":"ISN 2019-04: RDP Vulnerability in WES7","path":"/de/security-safety/current/isn-2019-04-rdp-vulnerability-in-wes7","children":[]},{"id":"ci_9e3c2df9d95a813752687043409fd7d3fc8943a8bc475dcaa394cb3e961bf874","title":"ISN 2019-03: Zombieload, RIDL, Fallout","path":"/de/security-safety/current/isn-2019-03-zombieload-ridl-fallout","children":[]},{"id":"ci_da1e3c22218675339c41184efdcc1f75dd26ddcd4ba0948dcf5627164595fd6a","title":"ISN 2019-02: UMS Vulnerability","path":"/de/security-safety/current/isn-2019-02-ums-vulnerability","children":[]},{"id":"ci_19d93bd9fcfae7b33935598742a538f2010ce48a6bef4189e0f4911773b47b9f","title":"ISN 2019-01: UMS Vulnerability","path":"/de/security-safety/current/isn-2019-01-ums-vulnerability","children":[]}]},{"id":"ci_1b0dd2ee0dccc176eb60de3cc666c7973ac7947a6376d995b21d55da88b32d8e","title":"Product Security Archive","path":"/de/security-safety/current/product-security-archive","children":[]},{"id":"ci_90924ff4df69440081ee589338988b4e4e26c2b9edd99ae743ed2808312383de","title":"Reporting Vulnerabilities in IGEL Products","path":"/de/security-safety/current/reporting-vulnerabilities-in-igel-products","children":[]},{"id":"ci_c4f9fa5eb01002878cfa19c337456079c922fbf0817c3a127c3fb9aa39048ab3","title":"UEFI Secure Boot Enabling Guides","path":"/de/security-safety/current/uefi-secure-boot-enabling-guides","children":[{"id":"ci_e34ea0624aabc6e05ae96cdd986dcfcecca2b6ecd7d96ca09ecefde61710d0ac","title":"IGEL OS","path":"/de/security-safety/current/igel-os","children":[{"id":"ci_bf064faf698947edefec07d54dfee0de8ed459c933f8378b3d7a0ac3222e67e9","title":"Enabling UEFI Secure Boot in UD2-LX 40","path":"/de/security-safety/current/enabling-uefi-secure-boot-in-ud2-lx-40","children":[]},{"id":"ci_306e5eb19156e29f44ef138ea4a6c232cbffd24a76f337dec46213b02a69f658","title":"Enabling UEFI Secure Boot in UD2-LX 50/51","path":"/de/security-safety/current/enabling-uefi-secure-boot-in-ud2-lx-50-51","children":[]},{"id":"ci_33464a5657d1fab9d03c5f2d552e9b8fcce740134bccc862150109131cfe1c7b","title":"Enabling UEFI Secure Boot in UD3-LX 50","path":"/de/security-safety/current/enabling-uefi-secure-boot-in-ud3-lx-50","children":[]},{"id":"ci_456470eb42ab7c02c01b65e99b54dbd92dfb4e49bc5ef4ec7dd7f0a7f2fce095","title":"Enabling UEFI Secure Boot in UD3-LX 51","path":"/de/security-safety/current/enabling-uefi-secure-boot-in-ud3-lx-51","children":[]},{"id":"ci_9aa6437b2e6f24e5a8b53b95284ccb719ce269a9492cb9047b2ffea7d61c5544","title":"Enabling UEFI Secure Boot in UD3-LX 60","path":"/de/security-safety/current/enabling-uefi-secure-boot-in-ud3-lx-60","children":[]},{"id":"ci_2d00a732197c488d7eee3d82457ef066f1d453d6818be7687c71d793fb55dff3","title":"Enabling UEFI Secure Boot in UD6-LX 51","path":"/de/security-safety/current/enabling-uefi-secure-boot-in-ud6-lx-51","children":[]},{"id":"ci_e5fc7c03117c050ef6ee561032ba1f8e85cd821fdd1ee81820f21c7d467307f1","title":"Enabling UEFI Secure Boot in UD7-LX 10","path":"/de/security-safety/current/enabling-uefi-secure-boot-in-ud7-lx-10","children":[]},{"id":"ci_7dd8dada6b3fb7bce722b22369d2c19bcd23d72eaad1da580affe9eed26ebd82","title":"Enabling UEFI Secure Boot in UD7-LX 20","path":"/de/security-safety/current/enabling-uefi-secure-boot-in-ud7-lx-20","children":[]}]},{"id":"ci_194914010ef1307230a94e09122161aa5f12038d4547c86d03be41fc801642bc","title":"Microsoft Windows 10 IoT","path":"/de/security-safety/current/microsoft-windows-10-iot","children":[{"id":"ci_71ac41ad2884ec5927eba100df07b50661291cd944ced1ccc475b015a9583fe8","title":"Enabling UEFI Secure Boot in UD3-W10 51","path":"/de/security-safety/current/enabling-uefi-secure-boot-in-ud3-w10-51","children":[]},{"id":"ci_ba357fdd6e0e7a2a9d2f56d5401079155f4d0c289ee5959d83671264910d72ce","title":"Enabling UEFI Secure Boot in UD6-W10 51","path":"/de/security-safety/current/enabling-uefi-secure-boot-in-ud6-w10-51","children":[]},{"id":"ci_1f444b20f2e2b328a31f10cde97d6057351543736eba26e3fe7a69f6ac94b312","title":"Enabling UEFI Secure Boot in UD7-W10 10","path":"/de/security-safety/current/enabling-uefi-secure-boot-in-ud7-w10-10","children":[]}]},{"id":"ci_b12de712430826b330a225669c20969f245e89cb7c8bc12dc756a1cbe3f46a14","title":"Verifying that Secure Boot is Enabled","path":"/de/security-safety/current/verifying-that-secure-boot-is-enabled","children":[]},{"id":"ci_ff2e7551fd23f713717defb7d7fa3ea6e414eed54420f84f1fd80bad36f2fd6b","title":"Secured-Core PCs: Microsoft 3rd-Party UEFI Certificate for Secure Boot","path":"/de/security-safety/current/secured-core-pcs-microsoft-3rd-party-uefi-certific","children":[]}]},{"id":"ci_587d6c8b4cd682acbab6966d3b2c18dab3dffa3539c73b9826bbbd111daab1e7","title":"AMD Secure Processor","path":"/de/security-safety/current/amd-secure-processor","children":[{"id":"ci_7b9fe63cc0b2fafc5a472a16f5fd5176fea2266b5784c0aabcfc0fed28dc40e0","title":"UD7 Model H850C","path":"/de/security-safety/current/ud7-model-h850c","children":[]}]},{"id":"ci_74b4dece720c86b193bf15809f7a3b4aefbc142edae03d3655f05d03bc267503","title":"AMD Memory Guard","path":"/de/security-safety/current/amd-memory-guard","children":[]},{"id":"ci_8775dc3bdbacec0cf7677763b715d41812ba711c70ca238536950afe088f04ee","title":"BSI Grundschutz","path":"/de/security-safety/current/bsi-grundschutz","children":[{"id":"ci_3e560acaac2258bc8b04f5b2258e45f740f55b0906e4caf736a5f6ae0020de56","title":"Anleitung zum IT-Grundschutz-konformen Betrieb von IGEL OS 11.03.100","path":"/de/security-safety/current/anleitung-zum-it-grundschutz-konformen-betrieb-von","children":[{"id":"ci_8c956b36337fc438fafe1bf1b3ad9b13b88effee9299c32ce1a18f03edac0207","title":"Über dieses Dokument","path":"/de/security-safety/current/uber-dieses-dokument","children":[]},{"id":"ci_4de33a39445527b71bf6b7729dbd489887908e8b01557786a279b4202ecee0ed","title":"Grundsätzliche Vorgaben zur Administration","path":"/de/security-safety/current/grundsatzliche-vorgaben-zur-administration","children":[]},{"id":"ci_78295d92f9dcdea4f472d7cf8194d5bd6fa4167aa1fe9ad7682ed89562bf3b04","title":"Fernwartung","path":"/de/security-safety/current/fernwartung","children":[]},{"id":"ci_b71d26115cff0a8f11b36498bbc064f392bab79a9de3373cba9e2c77fce2b2ff","title":"Zugriffskontrolle","path":"/de/security-safety/current/zugriffskontrolle","children":[]},{"id":"ci_c64de266c65c832584d4a3979741aec9af03af9fc769e1ff0fda08d2942d3a85","title":"Absicherung des Bootvorgangs","path":"/de/security-safety/current/absicherung-des-bootvorgangs","children":[]},{"id":"ci_b8235638855688b28fd834592e6d283fa5d2316efe98cc5a14153b8519947047","title":"Schutz bei Diebstahl oder Defekt","path":"/de/security-safety/current/schutz-bei-diebstahl-oder-defekt","children":[]},{"id":"ci_e6f307ca581d94376712830b4ab1c988a5e661c6a2d46f4b4a9c9d76b26ab049","title":"Schutz vor Manipulation","path":"/de/security-safety/current/schutz-vor-manipulation","children":[]},{"id":"ci_997505a162c7b8a6867fab346befd0c08bf734c85306e86e1d7059988f134202","title":"Einschränken der Benutzerumgebung","path":"/de/security-safety/current/einschranken-der-benutzerumgebung","children":[]},{"id":"ci_74c494c5878027134732fdbfc5e5256687687c314f04efc2078d50dbaaaf4cb7","title":"Protokollierung und Protokollauswertung","path":"/de/security-safety/current/protokollierung-und-protokollauswertung","children":[]},{"id":"ci_6db9c152a1d3ff02adf6b7c291be3f79a4e74738b4f138cda444a97312922a09","title":"Datensicherung","path":"/de/security-safety/current/datensicherung","children":[]},{"id":"ci_7b48305cf6a0615d8c5121b3d53b683e4492bda812f2ca34e7a174f4bf71310c","title":"Verschlüsselung","path":"/de/security-safety/current/verschlusselung","children":[]},{"id":"ci_d3f6e9e8f4c512c6206fffa2ed4f6f6a4103489c1829ef93f19c2c0867e9abb3","title":"Virenschutz","path":"/de/security-safety/current/virenschutz","children":[]},{"id":"ci_9f60e9470ecac8445d1f7699fc8a0a4e775318fb56673949f447afb99399a15d","title":"Systempflege","path":"/de/security-safety/current/systempflege","children":[]},{"id":"ci_5ac458d2bf9f2636de1c5c50afafc8c1be14d96b3b0099493c848a3be45caedd","title":"Zusätzliche Anforderungen aus SYS.2","path":"/de/security-safety/current/zusatzliche-anforderungen-aus-sys-2","children":[]},{"id":"ci_4f22779c70f9fd56a84db53146344f38f35ff1f378cdedecac46a1683cc16de0","title":"Logging and Log Evaluation","path":"/de/security-safety/current/logging-and-log-evaluation","children":[]}]},{"id":"ci_5d28f6bccdcb506fef71947c8d5bd74831c839a28493c72b6ac533d958431abf","title":"Anleitung zum IT-Grundschutz-konformen Betrieb von IGEL OS 12","path":"/de/security-safety/current/anleitung-zum-it-grundschutz-konformen-betrieb-v-1","children":[{"id":"ci_05f768ca7398c7439cd83a2c95db8303df184b0a81574dfd38672d86cd60c9c6","title":"Über das Dokument","path":"/de/security-safety/current/uber-das-dokument","children":[]},{"id":"ci_d66d5355956f944b2a3b3006d6eafab4a242d422cc7458a1d7b7a20c47ec47bd","title":"OPS.1.1.2 Ordnungsgemäße IT-Administration","path":"/de/security-safety/current/ops-1-1-2-ordnungsgemae-it-administration","children":[{"id":"ci_3f18eaeeffdbf4ca829785474dab19462df464b24111416689e72b79278c1ba8","title":"Standard-Anforderungen von OPS.1.1.2","path":"/de/security-safety/current/standard-anforderungen-von-ops-1-1-2","children":[]},{"id":"ci_211ba993fc25b9e1bad194d0cb14844db507d314ef8c85ebfc4f8f3ff3a3b7e9","title":"Anforderungen bei erhöhtem Schutzbedarf von OPS.1.1.2","path":"/de/security-safety/current/anforderungen-bei-erhohtem-schutzbedarf-von-ops-1-","children":[]},{"id":"ci_99565aa074daf82b0083edfa8cc9864ed0da667d86d7872b53d51a1be19ad675","title":"Basis-Anforderungen von OPS.1.1.2","path":"/de/security-safety/current/basis-anforderungen-von-ops-1-1-2","children":[]}]},{"id":"ci_f12a54e6c6b13fe9ff6d0ed023f5e36b5b48e05d1f7b78248b6299c703201865","title":"OPS.1.1.3 Patch- und Änderungsmanagement","path":"/de/security-safety/current/ops-1-1-3-patch-und-anderungsmanagement","children":[{"id":"ci_04058701c00ff8cd6c2f429e4f3ca10c4620618e56f8e5b69f9f64e0c8197b98","title":"Basis-Anforderungen von OPS.1.1.3","path":"/de/security-safety/current/basis-anforderungen-von-ops-1-1-3","children":[]},{"id":"ci_325b2192a545579a777d0fba118c2ff08ec0a2452f1bbae5602c854a032b1fd7","title":"Standard-Anforderungen von OPS.1.1.3","path":"/de/security-safety/current/standard-anforderungen-von-ops-1-1-3","children":[]},{"id":"ci_3c42e3f7fea23b67b2d2d03067fa0f57c4cfbd36a79134c5ac65cc22a3c77cad","title":"Anforderungen bei erhöhtem Schutzbedarf von OPS.1.1.3","path":"/de/security-safety/current/anforderungen-bei-erhohtem-schutzbedarf-von-ops--1","children":[]}]},{"id":"ci_7995275c2e744996227b8d273a00e64dfe42ded285dcf25b4ffdf5caa30a46e6","title":"OPS.1.1.4 Schutz vor Schadprogrammen","path":"/de/security-safety/current/ops-1-1-4-schutz-vor-schadprogrammen","children":[{"id":"ci_0ec9da8959b4c8b68b7e174a12b1346ce6de481dbacd046ed29da860d4c95e0c","title":"Basis-Anforderungen von OPS.1.1.4","path":"/de/security-safety/current/basis-anforderungen-von-ops-1-1-4","children":[]}]},{"id":"ci_e64883d6e9da191d7cbaab03f76620d4267ed44b5f63e5855f43a9708b75db9f","title":"OPS.1.1.5 Protokollierung","path":"/de/security-safety/current/ops-1-1-5-protokollierung","children":[{"id":"ci_51848520772bb9eb6401bc86981303632ce80012615869636b7f333284cdf904","title":"Basis-Anforderungen von OPS.1.1.5","path":"/de/security-safety/current/basis-anforderungen-von-ops-1-1-5","children":[]}]},{"id":"ci_7d524988f9152f435870e86f7d842ffbd07566d9ec18f55a92731efb232bd302","title":"OPS.1.2.5 Fernwartung","path":"/de/security-safety/current/ops-1-2-5-fernwartung","children":[{"id":"ci_28c5ee9a6738665f4b0eeea3e253c2128aceca4e6b8529cf1c7d073306b5bd8c","title":"Standard-Anforderungen von OPS.1.2.5","path":"/de/security-safety/current/standard-anforderungen-von-ops-1-2-5","children":[]},{"id":"ci_c25edb524ed129d00acbccd8da9ee8149b8a5860d269c1aaddb3503a94c3abf3","title":"Anforderungen bei erhöhtem Schutzbedarf von OPS1.2.5","path":"/de/security-safety/current/anforderungen-bei-erhohtem-schutzbedarf-von-ops1-2","children":[]}]},{"id":"ci_191428d5248857cba6b97d21f9dd20305e00515d998e34d38f2bb86ba2e921e6","title":"SYS.2.1 Allgemeiner Client","path":"/de/security-safety/current/sys-2-1-allgemeiner-client","children":[{"id":"ci_21f76c71557c13124070954745358681385da82ef506a95782e95bb665e772cc","title":"Basis-Anforderungen von SYS.2.1","path":"/de/security-safety/current/basis-anforderungen-von-sys-2-1","children":[]},{"id":"ci_4bda9ddb731efb9574a6cae1e92723e04260bf58db75dbbf4d5fe14cfcfd2d65","title":"Standard-Anforderungen von SYS.2.1","path":"/de/security-safety/current/standard-anforderungen-von-sys-2-1","children":[]},{"id":"ci_fcecde8a7763f807a0942d6f9773877035b8c7a10a9521237d86c76c6a550936","title":"Anforderungen bei erhöhtem Schutzbedarf von SYS.2.1","path":"/de/security-safety/current/anforderungen-bei-erhohtem-schutzbedarf-von-sys--1","children":[]}]},{"id":"ci_52d94d4d9224efa232056a718a030d19f4111e01f2b2ad5c34aec21bf8f7eada","title":"SYS.2.3 Clients unter Linux und Unix","path":"/de/security-safety/current/sys-2-3-clients-unter-linux-und-unix","children":[{"id":"ci_c0ccbc11ff6ff1fffa6d59a11b63a081034fcb0c01799071fa20448bbbec6c63","title":"Standard-Anforderungen von SYS.2.3","path":"/de/security-safety/current/standard-anforderungen-von-sys-2-3","children":[]},{"id":"ci_62442c449c5e74db46c4aa36031a71c185c1f6907206f38082c270e4bad8b111","title":"Anforderungen bei erhöhtem Schutzbedarf von SYS.2.3","path":"/de/security-safety/current/anforderungen-bei-erhohtem-schutzbedarf-von-sys-2-","children":[]},{"id":"ci_d01abeeaa641aaf19a59bf4d1a46eb79cb79b1b3ff43749e781368d5671c1d2e","title":"Basis-Anforderungen von SYS.2.3","path":"/de/security-safety/current/basis-anforderungen-von-sys-2-3","children":[]}]},{"id":"ci_e4aa13cf0e7c3796b67a792e258484d04e8db2f8dd2f0bf507ea508ad5b8ade2","title":"Weitere relevante Anforderungen","path":"/de/security-safety/current/weitere-relevante-anforderungen","children":[]}]}]},{"id":"ci_85555c61a78a5b8be91254cd8ab2bbb2c4e8ea2a4c821d21bd4486121b66a44d","title":"Parental Control Settings for IGEL OS","path":"/de/security-safety/current/parental-control-settings-for-igel-os","children":[]},{"id":"ci_461236a1d81ff2f8c122c2e1f90e93b8aed40eec9385ff38c37c3fdb378a21ab","title":"Xz Backdoor (CVE-2024-3094) Does Not Affect IGEL OS 11 and OS 12","path":"/de/security-safety/current/xz-backdoor-cve-2024-3094-does-not-affect-igel-os-","children":[]}]