[{"id":"ci_190a10158884ae96e48c8ef2eff27e7e0b6a6ee6c3fe5314ee239cfe273f2eb4","title":"IGEL Product Security Information","path":"/en/security-safety/current/igel-product-security-information","children":[{"id":"ci_c7d6db355e24c8bbe5c88ed0a9424ec223e377872e89a66e35d51938c2191f1f","title":"ISN 2026-11: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2026-11-firefox-esr-vulnerabilities","children":[]},{"id":"ci_cf106614bbf0b05eeb986da8f500236ab87d8d604f485ce980ecdb12954eee38","title":"ISN 2026-09: UMS Information Disclosure","path":"/en/security-safety/current/isn-2026-09-ums-information-disclosure","children":[]},{"id":"ci_2e224809c00167e4fc2438418e311b11a847648b0ffbbd3d3d12a909e869d11a","title":"ISN 2026-08: Telnetd Vulnerabilities","path":"/en/security-safety/current/isn-2026-08-telnetd-vulnerabilities","children":[]},{"id":"ci_abd7ba2f70477e3052ba46b8a27855ea7963a1045ecbae35eec7644711ff261b","title":"ISN 2026-07: AppArmor Vulnerabilities","path":"/en/security-safety/current/isn-2026-07-apparmor-vulnerabilities","children":[]},{"id":"ci_a744bc01d2f4690c66d0ef1b917aa958b030c69fb6e70c0ac7edcd9fafae6161","title":"ISN 2026-06: Chromium Vulnerabilities Exploited in the Wild","path":"/en/security-safety/current/isn-2026-06-chromium-vulnerabilities-exploited-in-","children":[]},{"id":"ci_852b1309ae70950b3e6eb4000e2fcd9937b59e0a8e7958617b98d7157c7dd31a","title":"ISN 2026-05: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2026-05-firefox-esr-vulnerabilities","children":[]},{"id":"ci_2255977543857d2bfa34b5afcfac17dd8c4f262dbff81649673ac442227ac429","title":"ISN 2026-04: Chromium Vulnerabilities Exploited in the Wild","path":"/en/security-safety/current/isn-2026-04-chromium-vulnerabilities-exploited-in-","children":[]},{"id":"ci_60c7ffc6341e96d3d4de47a5c46e69c86f4b577a9da8ad5dfaddf6673be5f85f","title":"ISN 2026-03: OpenSSL Vulnerability","path":"/en/security-safety/current/isn-2026-03-openssl-vulnerability","children":[]},{"id":"ci_1375685d6c03a7c3ed835d85c97afee9db19ddb0536b84a387ba5ed1e262f11e","title":"ISN 2026-02: Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2026-02-chromium-vulnerabilities","children":[]},{"id":"ci_aba89754a56629001152a12af65ad1bd132150d083edf37e4cc7ab9825be6569","title":"ISN 2026-01: X.Org Server Vulnerabilities","path":"/en/security-safety/current/isn-2026-01-x-org-server-vulnerabilities","children":[]},{"id":"ci_5f170b945b5a5025d7b170a2decd2c880eccdcd160515fbc3f5ee88a01174e75","title":"ISN 2025-51: Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2025-51-chromium-vulnerabilities","children":[]},{"id":"ci_18de1d4f8a5ec36845e71331d61ec489836b6d540393da977f054ebccf73641b","title":"ISN 2025-50 Chromium Vulnerability Exploited in the Wild","path":"/en/security-safety/current/isn-2025-50-chromium-vulnerability-exploited-in-th","children":[]},{"id":"ci_35effd2d8c1ee7c9e1c6df096b5a8c16b217b8cd7410f28ed8740355e23cfaa6","title":"ISN  2025-49 Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2025-49-firefox-esr-vulnerabilities","children":[]},{"id":"ci_f4ef7919d536ea8f18d6299dbc58dafa0e03014cc6f12d52cb5e4b7cd8ad8900","title":"ISN 2025-48 Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2025-48-chromium-vulnerabilities","children":[]},{"id":"ci_3bc9d0d33493b985d632e3d1ef9ff1e6bc0f969791439c4b3ed2baf1ef8625c6","title":"ISN 2025-47: IGEL Citrix Workspace App Package Vulnerability","path":"/en/security-safety/current/isn-2025-47-igel-citrix-workspace-app-package-vuln","children":[]},{"id":"ci_0557a8f11472c2602746fb3c6400d8df970a074228aee209b7c515299781703c","title":"ISN 2025-46: Webkit Vulnerability","path":"/en/security-safety/current/isn-2025-46-webkit-vulnerability","children":[]},{"id":"ci_8a26abf9c8e4811751fcf480c098fe34ecbe8770465ddc281df97de30e8215c9","title":"ISN 2025-45 LibTiff Vulnerability","path":"/en/security-safety/current/isn-2025-45-libtiff-vulnerability","children":[]},{"id":"ci_adb6323eb8cbe8cd32170b4c8723578a82216634b1128d82fb2b46ea8ab46e08","title":"ISN 2025-44 Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2025-44-chromium-vulnerabilities","children":[]},{"id":"ci_702bc0bcd6f0a29238c1ef1496f039c08eab1d1a0e673af2187d8f2223fe82c3","title":"ISN 2025-43: OpenSSL Vulnerability","path":"/en/security-safety/current/isn-2025-43-openssl-vulnerability","children":[]},{"id":"ci_9cfb0aa1f4a544037984d82d01f8892ebcaa2f0bf4dcc01da0616d7cfc10ba54","title":"ISN 2025-42: ImageMagick Vulnerabilities","path":"/en/security-safety/current/isn-2025-42-imagemagick-vulnerabilities","children":[]},{"id":"ci_45d5c5edc73f72df3e6a1d83d86ce91a5d9c49f792fd233b31bf3bcc180cd13d","title":"ISN 2025-41: CUPS Vulnerability","path":"/en/security-safety/current/isn-2025-41-cups-vulnerability","children":[]},{"id":"ci_72e224fcb655a4ddf8db93355d2c05b321354479eddb99a7da463f7d5e63dba2","title":"ISN 2025-39: Webkit Vulnerability","path":"/en/security-safety/current/isn-2025-39-webkit-vulnerability","children":[]},{"id":"ci_463e562e5a8cce5a4a1364e95ea7bfd7bd013c17e57ec09deffd0760daf04f01","title":"ISN 2025-38: Critical Chromium Vulnerabilities CVE-2025-10200 & CVE-2025-10585","path":"/en/security-safety/current/isn-2025-38-critical-chromium-vulnerabilities-cve-","children":[]},{"id":"ci_50751054e9825a0778346fe1706873aed91b74e8fd4f6b62456b3c44ab01245b","title":"ISN 2025-37: Critical Chromium Vulnerability","path":"/en/security-safety/current/isn-2025-37-critical-chromium-vulnerability","children":[]},{"id":"ci_7c1b8d65c53c39607f775f09566c94539983b36433e939c59d3155243ae0db48","title":"ISN 2025-36: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2025-36-firefox-esr-vulnerabilities","children":[]},{"id":"ci_d6e3d107cae90467d358c0c7c275a7cfc2e082cd90f49e362edb026ff2c0e7c7","title":"ISN 2025-35: JRE Vulnerabilities","path":"/en/security-safety/current/isn-2025-35-jre-vulnerabilities","children":[]},{"id":"ci_9d2ea621afe1393d3dcebd9327b69a911e4a924a781514f3d4a6529645252486","title":"ISN 2025-34: Libarchive Vulnerability","path":"/en/security-safety/current/isn-2025-34-libarchive-vulnerability","children":[]},{"id":"ci_33956679d913139bf2aa93dfc529da8ecde4ab780e5cc7836c737eeb9355bfb6","title":"ISN 2025-33: Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2025-33-chromium-vulnerabilities","children":[]},{"id":"ci_425d3d70ec5c4d4c0575e2922bdd9514589485ee0a78168581239b178e24e861","title":"ISN 2025-32: Webkit Vulnerabilities","path":"/en/security-safety/current/isn-2025-32-webkit-vulnerabilities","children":[]},{"id":"ci_65cf494a43ae6a046cb0965d84bb63a44655120d1af54b26135ae8a926e483a4","title":"ISN 2025-31: XSS Vulnerabilities in UMS","path":"/en/security-safety/current/isn-2025-31-xss-vulnerabilities-in-ums","children":[]},{"id":"ci_ba25f9a9818e1e6a798648d0a81d6a525c574089a2f34a0b33ed4cc5f97c7e84","title":"ISN 2025-30: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2025-30-firefox-esr-vulnerabilities","children":[]},{"id":"ci_d34963f7dee25e6876ead6606c1883ff12ed2599e5e3e63e5397e99c064f35d4","title":"ISN 2025-29: Chromium Vulnerability in ANGLE Exploited in the Wild","path":"/en/security-safety/current/isn-2025-29-chromium-vulnerability-in-angle-exploi","children":[]},{"id":"ci_1461ab9a8f5e973de987ae2c08d9b3d18f59224ec6f788f968359372a1a585e9","title":"ISN 2025-26: Chromium Vulnerability Exploited in the Wild","path":"/en/security-safety/current/isn-2025-26-chromium-vulnerability-exploited-in-th","children":[]},{"id":"ci_da4c5bce6ffd5072c4b1fae2e3e82223840ef6e0aed78d956584b94983f5bf75","title":"ISN 2025-25: Firefox ESR Vulnerability","path":"/en/security-safety/current/isn-2025-25-firefox-esr-vulnerability","children":[]},{"id":"ci_5d275dcc42834d101e2f6a513987b828df7f14c127f8a9e4152f204d4c83a5d8","title":"ISN 2025-24: Command Execution in IGEL OS","path":"/en/security-safety/current/isn-2025-24-command-execution-in-igel-os","children":[]},{"id":"ci_e35b57cca805fab138e12a6c91369388c0f1c3d9b5535797c43d0f0c39c52af8","title":"ISN 2025-23: Chromium Vulnerability Exploited in the Wild","path":"/en/security-safety/current/isn-2025-23-chromium-vulnerability-exploited-in-th","children":[]},{"id":"ci_976643bc56bd7e8576abe106279a358fb50318f2a19f00926eff81879dd69794","title":"ISN 2025-22: Statement on CVE-2025-47827 in IGEL OS 10","path":"/en/security-safety/current/isn-2025-22-statement-on-cve-2025-47827-in-igel-os","children":[]},{"id":"ci_07a9e44ea423d02e9774a010c6e1a2a184d33a3ac8c61e5b3137401784297e14","title":"ISN 2025-21: Glibc Vulnerability","path":"/en/security-safety/current/isn-2025-21-glibc-vulnerability","children":[]},{"id":"ci_6c224b13856be1e72fbd46d87d5ceb424e35e0cf526a9a547aa946d586b2d93e","title":"ISN 2025-20: Critical Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2025-20-critical-firefox-esr-vulnerabilities","children":[]},{"id":"ci_d6a815e854b03924445b71c913b47dbf909bbc355f8e62c269e666de13db949e","title":"ISN 2025-19: Chromium Vulnerability Exploited in the Wild","path":"/en/security-safety/current/isn-2025-19-chromium-vulnerability-exploited-in-th","children":[]},{"id":"ci_3891e0b8feed7e6e261a30f57e0c74c357b419348f8f6e93cd0eace4b90d4274","title":"ISN 2025-18: Critical Libsoup Vulnerability","path":"/en/security-safety/current/isn-2025-18-critical-libsoup-vulnerability","children":[]},{"id":"ci_c2445fda203af7539670cb9e71b59da1ad57f9d7aa695097df2bdf3d6bebd309","title":"ISN 2025-17: Vulnerabilities in NVIDIA Graphics Driver","path":"/en/security-safety/current/isn-2025-17-vulnerability-in-nvidia-graphics-drive","children":[]},{"id":"ci_91f49858c523d4fdd0bf2e557521c738019636378484352cf5a2455e6991568a","title":"[CORRECTED] ISN 2025-16: Critical Vulnerability in Ppp","path":"/en/security-safety/current/isn-2025-16-critical-vulnerability-in-ppp","children":[]},{"id":"ci_26a7c62ac4d96b76561dc050ea8006fe3a56fd37244821d5c41d794655ddc56b","title":"ISN 2025-15: Perl Vulnerability","path":"/en/security-safety/current/isn-2025-15-perl-vulnerability","children":[]},{"id":"ci_71a20551184d72189e86f3ddc59fd0dc01ac27a9a9892730c507ab4c3a136fdc","title":"ISN 2025-14: Critical IGEL OS Privilege Escalation","path":"/en/security-safety/current/isn-2025-14-critical-igel-os-privilege-escalation","children":[]},{"id":"ci_0dcba4fc52a1a3bd5260481f29c5bab0348c61c2d32068b34cae3ccfea9d009f","title":"ISN 2025-13: Chromium Critical Vulnerability","path":"/en/security-safety/current/isn-2025-13-chromium-critical-vulnerability","children":[]},{"id":"ci_169d4a2a1540101b86d835423140945ac2952a6ec2724e3989f1a86028c953da","title":"ISN 2025-12: Chromium Critical Vulnerability","path":"/en/security-safety/current/isn-2025-12-chromium-critical-vulnerability","children":[]},{"id":"ci_9278b816d1c526b06fe5799bd27bbad18e8f5c9aa45b31fd72968ee7f1a389a6","title":"ISN 2025-10: Linux Kernel Vulnerability","path":"/en/security-safety/current/isn-2025-10-linux-kernel-vulnerability","children":[]},{"id":"ci_cbc08696d33ed98af2f0041de430e22bba3febc30417a4ee1905b2413b541a58","title":"ISN 2025-09: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2025-09-firefox-esr-vulnerabilities","children":[]},{"id":"ci_76323d18181c9995e4803eefc3d7395efd3266fea5d70336471dfd504405e0af","title":"ISN 2025-08: Libxml2 Vulnerabilities","path":"/en/security-safety/current/isn-2025-08-libxml2-vulnerabilities","children":[]},{"id":"ci_092813e753f87335efbc1811a87f8a87e00843be4ad08f1ff7fcdf883a79ef70","title":"ISN 2025-07: X.org Vulnerabilities","path":"/en/security-safety/current/isn-2025-07-x-org-vulnerabilities","children":[]},{"id":"ci_532df10be36d04019d97dd107c7b5d3fd0504d67fd24134fe42c6b22f24a8531","title":"ISN 2025-06: Critical Webkit Vulnerability","path":"/en/security-safety/current/isn-2025-06-critical-webkit-vulnerability","children":[]},{"id":"ci_691266d2e226a1e7f01ac5c266a33ba0211a9e58aa2e3f6b284f4ad432162fd0","title":"ISN 2025-05: HP Anyware Vulnerability","path":"/en/security-safety/current/isn-2025-05-hp-anyware-vulnerability","children":[]},{"id":"ci_5eb5f45d3ed53088c0aefce803809b865976111573d47ad0c97d78e9868fb45c","title":"ISN 2025-04: Microsoft Edge Vulnerabilities","path":"/en/security-safety/current/isn-2025-04-microsoft-edge-vulnerabilities","children":[]},{"id":"ci_37358606d7a9e95e0e3488352ae50215ccf810c3d12d69abb61935c5cb664379","title":"ISN 2025-03: Gstreamer Vulnerabilities","path":"/en/security-safety/current/isn-2025-03-gstreamer-vulnerabilities","children":[]},{"id":"ci_00dc7e070ba5ca309eea7ec3687dbef7224b0c7e9c271df42aff792da47443a8","title":"ISN 2025-02: Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2025-02-chromium-vulnerabilities","children":[]},{"id":"ci_01f5958953a59fd91f19a0152e3243ae69172fbae6ee595bc70d3cfc530393be","title":"ISN 2025-01: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2025-01-firefox-esr-vulnerabilities","children":[]},{"id":"ci_cf1c604ee0cda136942d417d06c5aca59028f248ea699901fad7c70cc2ad28f5","title":"ISN 2024-24: Chromium Vulnerability","path":"/en/security-safety/current/isn-2024-24-chromium-vulnerability","children":[]},{"id":"ci_3772ab09aea31657296824cf0baaea92e29be4f96fb48c784d6ca3ebca920e93","title":"ISN 2024-23: Webkit2GTK Critical Vulnerability","path":"/en/security-safety/current/isn-2024-23-webkit2gtk-critical-vulnerability","children":[]},{"id":"ci_74b90052ee578f28139d8c75b5696e7e00a0004415a5dd5dd0160e6c2ae44227","title":"ISN 2024-22: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2024-22-firefox-esr-vulnerabilities","children":[]},{"id":"ci_22aa878a1f8958d9d51917e3b1d9046fef9e306738f40d44dee76be5216caecb","title":"ISN 2024-21: Chromium Critical Vulnerability","path":"/en/security-safety/current/isn-2024-21-chromium-critical-vulnerability","children":[]},{"id":"ci_3bab16276765f6601de3ed68110601c75be51be4e38e96e41a5cfd8d7dc98c5c","title":"ISN 2024-20: Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2024-20-chromium-vulnerabilities","children":[]},{"id":"ci_cdb9d24b9776e084c43c29f4c9bacd158eb602a5d11dd1167148e8631d0137d9","title":"ISN 2024-19: CUPS Vulnerabilities","path":"/en/security-safety/current/isn-2024-19-cups-vulnerabilities","children":[]},{"id":"ci_b85b54e11ddb90767856b1bb7ce011d367dcbb26911fa2c13dd8406e3ff64c51","title":"ISN 2024-18: Critical Firefox ESR Vulnerability","path":"/en/security-safety/current/isn-2024-18-critical-firefox-esr-vulnerability","children":[]},{"id":"ci_40152320353ed1dd061a506a19254b95a18823bad7ac867202ecff093f3cd15f","title":"ISN 2024-17: OpenSSH Vulnerability","path":"/en/security-safety/current/isn-2024-17-openssh-vulnerability","children":[]},{"id":"ci_85632006db8e24bede6fc29a37c825a322c5bfb710b65d1ae8067e96e7a3c63c","title":"ISN 2024-16: Libarchive Vulnerability","path":"/en/security-safety/current/isn-2024-16-libarchive-vulnerability","children":[]},{"id":"ci_b59b85f02c425795fec2bcb4f9e0de956c351949c42b94dd26b0040690af2065","title":"ISN 2024-15: Libaom Vulnerability","path":"/en/security-safety/current/isn-2024-15-libaom-vulnerability","children":[]},{"id":"ci_6cbb3e63fdc377eeabda6e4db2ab48015ff2044f8449ca006ec2ced3565c852a","title":"ISN 2024-14: Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2024-14-chromium-vulnerabilities","children":[]},{"id":"ci_a7aa2cf414a651c7a4301f46f892164c1cecd411466a65b3313788e397b2b676","title":"ISN 2024-13: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2024-13-firefox-esr-vulnerabilities","children":[]},{"id":"ci_f85ea73062afa84bf235672f0ed61148089bf8f6dee18c17685b767e65d7c722","title":"ISN 2024-12: Vulnerability in Starter License Verification","path":"/en/security-safety/current/isn-2024-12-vulnerability-in-starter-license-verif","children":[]},{"id":"ci_3c4f54e5e8ae3a7ab3b29c5b474ea8965b833f7e8623860cbd21a8407982e7b4","title":"ISN 2024-11: Chromium Critical Vulnerability","path":"/en/security-safety/current/isn-2024-11-chromium-critical-vulnerability","children":[]},{"id":"ci_37db7ca71682bad2c98a85b616668c0d007cd1c6efbed61b303efc7e71af4c5c","title":"ISN 2024-10: Chromium Critical Vulnerability","path":"/en/security-safety/current/isn-2024-10-chromium-critical-vulnerability","children":[]},{"id":"ci_acab10c1bad1520dd997b365efda80a33fc4930b5137a05ab5f542ee63c5780e","title":"ISN 2024-09: Xdg-open “Open With” Vulnerability","path":"/en/security-safety/current/isn-2024-09-xdg-open-open-with-vulnerability","children":[]},{"id":"ci_66ceb7f58ae5c72e047bbba89c76eb6aaec2dcebf5ba33f38a3fb7f80b2ec697","title":"ISN 2024-08: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2024-08-firefox-esr-vulnerabilities","children":[]},{"id":"ci_717d01981d0c2169b86510f2e6de2f1eeed64ff7f2b238eb949c243e18728d99","title":"ISN 2024-07: Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2024-07-chromium-vulnerabilities","children":[]},{"id":"ci_6f09620637793778de26dda87365d1b723d4307829c258f59280598af5c2a9cf","title":"ISN 2024-06: OS 11 Kernel Vulnerabilities","path":"/en/security-safety/current/isn-2024-06-os-11-kernel-vulnerabilities","children":[]},{"id":"ci_0508ab3218d340b3f7e4d9fc3224f2c05209a071b445a30fab9467f3fd015fe3","title":"ISN 2024-05: OS 12 Kernel Vulnerability","path":"/en/security-safety/current/isn-2024-05-os-12-kernel-vulnerability","children":[]},{"id":"ci_5f3f22b2051e8d63935883b55566747c8675f575b3a4f26761424b89ba916333","title":"ISN 2024-04: Libuv Vulnerability","path":"/en/security-safety/current/isn-2024-04-libuv-vulnerability","children":[]},{"id":"ci_9001f87dfdae8e5e48cc638684bf5ef4046e7dad80f66e7ff5c7dc204144cf3c","title":"ISN 2024-03: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2024-03-firefox-esr-vulnerabilities","children":[]},{"id":"ci_12fc7dc67ae1ed64edd747cfe5a6b709efe0f08f4ed996e5b39e601c3d2cfdd3","title":"ISN 2024-02: X.org Vulnerabilities","path":"/en/security-safety/current/isn-2024-02-x-org-vulnerabilities","children":[]},{"id":"ci_38e849d1285ec75f66725eb785ec9ff61d548b5cace2741c45b343ad8629f571","title":"ISN 2024-01: Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2024-01-chromium-vulnerabilities","children":[]},{"id":"ci_1b043863a0be7bf808597c70acc1a3a573dc5498f74c36a4ccf1d9d3a0f3532b","title":"ISN 2023-39: SSH Terrapin Vulnerability","path":"/en/security-safety/current/isn-2023-39-ssh-terrapin-vulnerability","children":[]},{"id":"ci_e5980ac748f0419a501f728d73cf8dc6e775439814666564f79f4a7586966c49","title":"ISN 2023-38: X.org Vulnerabilities","path":"/en/security-safety/current/isn-2023-38-x-org-vulnerabilities","children":[]},{"id":"ci_0c063d7b47222ef58a14b7b312b52ccb58472770af5fc513ed40bf802f56ff4b","title":"ISN 2023-36: BlueZ Vulnerability","path":"/en/security-safety/current/isn-2023-36-bluez-vulnerability","children":[]},{"id":"ci_26a1c0f4bc4473a814cef728ca2c03b89d96e84306453423e3161421bc5ffca3","title":"ISN 2023-35: GIMP Vulnerabilities","path":"/en/security-safety/current/isn-2023-35-gimp-vulnerabilities","children":[]},{"id":"ci_51f995a01ebd80ac81ac785aacaa8212e6a349f9b776b044d331807ef4ba6b3b","title":"ISN 2023-34: Perl Vulnerabilities","path":"/en/security-safety/current/isn-2023-34-perl-vulnerabilities","children":[]},{"id":"ci_7b41c4cb9ee6d36fc524132d74be63c5a9dc1984891c1947845cffd7bffd3d7a","title":"ISN 2023-33: Zlib Vulnerability","path":"/en/security-safety/current/isn-2023-33-zlib-vulnerability","children":[]},{"id":"ci_a6ce900659c8bc369acac14d5a2c262e85ea6e3924d1df855514445ab530e008","title":"ISN 2023-32: Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2023-32-chromium-vulnerabilities","children":[]},{"id":"ci_329df3418d8ca6851c2ab652d0061ae8068f32d0c00474b6b8adcc93db3d6ae0","title":"ISN 2023-31: Webkit Vulnerabilities","path":"/en/security-safety/current/isn-2023-31-webkit-vulnerabilities","children":[]},{"id":"ci_123ff2fbf783b30f0c754d62b9a71eca1192b119d6f872eb7dcf36b5c9d98386","title":"ISN 2023-30: Ffmpeg Vulnerabilities","path":"/en/security-safety/current/isn-2023-30-ffmpeg-vulnerabilities","children":[]},{"id":"ci_47f30d0248469ca6eb9c4078d33e8cae897addeb774475af174032d90842b394","title":"ISN 2023-29: Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2023-29-chromium-vulnerabilities","children":[]},{"id":"ci_f42336c929690cf2448eac95af0ddd93139d3122e5288d6563e2ba71c76efbf7","title":"ISN 2023-28: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2023-28-firefox-esr-vulnerabilities","children":[]},{"id":"ci_518428a90cc1bfaafaf5358352ff2cf75f59b26f3af0608bad7ea74d7c9510e8","title":"ISN 2023-27: ActiveMQ in UMS HA","path":"/en/security-safety/current/isn-2023-27-activemq-in-ums-ha","children":[]},{"id":"ci_25ba25a2d06eaede7a4a389bfbcfc22478f20a8e5ab6b5451ccc92c906466ca9","title":"ISN 2023-26: X.org Vulnerabilities","path":"/en/security-safety/current/isn-2023-26-x-org-vulnerabilities","children":[]},{"id":"ci_70277deed7cbe51ad352b37828468b5136e7684e532eb50c665c70fd3b197ef8","title":"ISN 2023-25: Webkit Vulnerabilities","path":"/en/security-safety/current/isn-2023-25-webkit-vulnerabilities","children":[]},{"id":"ci_c22c9ca20de4cbfdc2cfba91e0d4dac5998638740045ef60d03474c16a873faa","title":"ISN 2023-24: Chromium Vulnerability","path":"/en/security-safety/current/isn-2023-24-chromium-vulnerability","children":[]},{"id":"ci_4fb42500bff0814cceac4e013eff80fe9e9e6b9f3c242ff1190fc42f6a3af24a","title":"ISN 2023-23: Curl Vulnerability","path":"/en/security-safety/current/isn-2023-23-curl-vulnerability","children":[]},{"id":"ci_8d562560b6c0fd14bc2cf9cc7abde1c2b5cb32db49e7466d9d1187c73d8f1912","title":"ISN 2023-22: Multiple X11 Vulnerabilites","path":"/en/security-safety/current/isn-2023-22-multiple-x11-vulnerabilites","children":[]},{"id":"ci_5e058c4c67e453605ff54cde418435dd0de3fa3c739bc96dceb7d92418ce7d2c","title":"ISN 2023-21: Libvpx Vulnerability in Chromium and Firefox","path":"/en/security-safety/current/isn-2023-21-libvpx-vulnerability-in-chromium-and-f","children":[]},{"id":"ci_b7a3ed111182de02885809cbee16049352d6abddcec8bd1d40cb7bb45a37aac9","title":"ISN 2023-20: Firefox Libwebp Vulnerability","path":"/en/security-safety/current/isn-2023-20-firefox-libwebp-vulnerability","children":[]},{"id":"ci_ca4fff7fba1d44df33b14bc94cd7446d91c00928d920169e94386e25f9434031","title":"ISN 2023-19: Libwebp Vulnerability in Chromium and Other Software","path":"/en/security-safety/current/isn-2023-19-libwebp-vulnerability-in-chromium-and-","children":[]},{"id":"ci_74951ca372112cf77b31d97163cde5975b1882644eb4f025587449f156ae477b","title":"ISN-2023-18: SnakeYAML Vulnerability","path":"/en/security-safety/current/isn-2023-18-snakeyaml-vulnerability","children":[]},{"id":"ci_29561e9f4df755f76ab11a64ee8a632655e3943c1b3993b94b2e0d274fb91f0d","title":"ISN 2023-17: AMD Inception CPU Vulnerability","path":"/en/security-safety/current/isn-2023-17-amd-inception-cpu-vulnerability","children":[]},{"id":"ci_8c13d1cae388e102406c3472fc114c27c5bbff3587c57af8dfb3eb5948da11fc","title":"ISN 2023-16: Intel Downfall CPU Vulnerability","path":"/en/security-safety/current/isn-2023-16-intel-downfall-cpu-vulnerability","children":[]},{"id":"ci_24680f6d16a7a127affdf8a2ac702e62193689de081a8b4a1b03aee7a4058875","title":"ISN 2023-15: ZenBleed Vulnerability","path":"/en/security-safety/current/isn-2023-15-zenbleed-vulnerability","children":[]},{"id":"ci_4602d797600730ce6d2300add80c68352fdc5ee85ad55b9e9708b56a5445e749","title":"ISN 2023-14: IGEL OS OpenSSH Vulnerability","path":"/en/security-safety/current/isn-2023-14-igel-os-openssh-vulnerability","children":[]},{"id":"ci_f9bec94bb65397fdfd11948c631ae92dad6ce7085abe323c54973a06b77898d8","title":"ISN 2023-13: IGEL OS Ghostscript Vulnerability","path":"/en/security-safety/current/isn-2023-13-igel-os-ghostscript-vulnerability","children":[]},{"id":"ci_fdd2a93190e4006d06b8802e73509cdb933dd3d4358e80f621bb29c9f86fe457","title":"ISN 2023-12: Citrix Secure Access Client","path":"/en/security-safety/current/isn-2023-12-citrix-secure-access-client","children":[]},{"id":"ci_a41149fa46abc6eb05e685f0bd0d4a27612268d07e636275fcfaf2180883838a","title":"ISN 2023-11: “StackRot” in IGEL OS Kernel","path":"/en/security-safety/current/isn-2023-11-stackrot-in-igel-os-kernel","children":[]},{"id":"ci_8fedf8aadd10b0b2281393f76f3331c9004e7b0bea4da48d9a6cee9336060db5","title":"ISN 2023-10: Log4j 1.x in IBM i Access Client","path":"/en/security-safety/current/isn-2023-10-log4j-1-x-in-ibm-i-access-client","children":[]},{"id":"ci_7cc9b5a8be897bcf5240041f05a9401f1d56e50a736688efc27b957674b40bda","title":"ISN 2023-09: RCE in CUPS Printing System","path":"/en/security-safety/current/isn-2023-09-rce-in-cups-printing-system","children":[]},{"id":"ci_9dabab3d6b85b87f022363b51d1e1faf779a55625dd5f73d644c709d5f4b9a5d","title":"ISN 2023-08: Chromium Critical Vulnerability","path":"/en/security-safety/current/isn-2023-08-chromium-critical-vulnerability","children":[]},{"id":"ci_6222753225a1947f7cfb071d900424e7dbfe3a832cb088c04cdd6f99fedadcbe","title":"ISN 2023-07: Device Encryption Password Bug","path":"/en/security-safety/current/isn-2023-07-device-encryption-password-bug","children":[]},{"id":"ci_89f2c1db75ac1b40ed606680634b627fdfcdd7f479249c42757c77f3e3a27043","title":"ISN 2023-06: UEFI Secure Boot Malware and IGEL OS","path":"/en/security-safety/current/isn-2023-06-uefi-secure-boot-malware-and-igel-os","children":[]},{"id":"ci_1a027dafbf1ff23122617441772465597baf94680da88915402e96e9229700bf","title":"ISN 2023-05: Chromium Local File Access","path":"/en/security-safety/current/isn-2023-05-chromium-local-file-access","children":[]},{"id":"ci_8378f28b92dff37a440ac776d7328e0865a08c5a3ad75632d29aea9d52375c2c","title":"ISN 2023-04: IGEL OS Local Privilege Escalation","path":"/en/security-safety/current/isn-2023-04-igel-os-local-privilege-escalation","children":[]},{"id":"ci_e410af23ee97db10cdca19fc524ff2c37527bf0cea4a4acdd3384d5b8ce24e7f","title":"ISN 2023-03: Chromium Vulnerabilities","path":"/en/security-safety/current/isn-2023-03-chromium-vulnerabilities","children":[]},{"id":"ci_72220710a608bd1ed6c33292a745a606c1e9578a5fa06feea887a81d8a8ac092","title":"ISN 2023-02: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2023-02-firefox-esr-vulnerabilities","children":[]},{"id":"ci_04495f2bd4366d10886066024b4d968309c673aadddbf7f130e6d2a745b255a4","title":"ISN 2023-01: Citrix Workspace App Vulnerability","path":"/en/security-safety/current/isn-2023-01-citrix-workspace-app-vulnerability","children":[]},{"id":"ci_0e0d70f25a6631a9f4159fa017eefff5b5773b27606e085a0bb2cf9ae1892a38","title":"ISN 2022-21: Chromium Vulnerability","path":"/en/security-safety/current/isn-2022-21-chromium-vulnerability","children":[]},{"id":"ci_ea5bb1906b8d6e05229b5e2740b187e61a74d9bb404b30119c5f6d2fac0393bf","title":"ISN 2022-20: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2022-20-firefox-esr-vulnerabilities","children":[]},{"id":"ci_ed22e7923863e32dacad90071bb57389f7dbd40841ef4a45813fb300f7bc6dd6","title":"ISN 2022-19: Log4j 1.x Remainder in UMS","path":"/en/security-safety/current/isn-2022-19-log4j-1-x-remainder-in-ums","children":[]},{"id":"ci_3cd9268874d2c4542d55519f85d42a61fb30c55ce38814ce26aa61cb3b1fecc2","title":"ISN 2022-18: Linux Kernel Vulnerability","path":"/en/security-safety/current/isn-2022-18-linux-kernel-vulnerability","children":[]},{"id":"ci_f14d4b53662c4ce1e51490cc7d29f8233f25247ca5d699d5e8c08cce6cb22a53","title":"ISN 2022-17: Chromium WebRTC Vulnerability","path":"/en/security-safety/current/isn-2022-17-chromium-webrtc-vulnerability","children":[]},{"id":"ci_6981d99e787bdda311c47a92c5f604ef712ad651b6dafc81073b356746ee296e","title":"ISN 2022-16: Firefox Vulnerabilities","path":"/en/security-safety/current/isn-2022-16-firefox-vulnerabilities","children":[]},{"id":"ci_385e7cb2dc06d9e282779ed532c48a77255b3d8312ec3033014142ddd5c6ba39","title":"ISN 2022-15: Chromium Browser Vulnerabilities","path":"/en/security-safety/current/isn-2022-15-chromium-browser-vulnerabilities","children":[]},{"id":"ci_0da5b298e358276917a9c4a06241b9122dea0d7e654222db804dc94f1923f04c","title":"ISN 2022-14: Chromium Browser Vulnerabilities","path":"/en/security-safety/current/isn-2022-14-chromium-browser-vulnerabilities","children":[]},{"id":"ci_281184494071df31904f7c1dbb8014feea5e5a23eaaea689b8cf4c9a941229b7","title":"ISN 2022-13: UMS Vulnerabilities","path":"/en/security-safety/current/isn-2022-13-ums-vulnerabilities","children":[]},{"id":"ci_46a01674e9b2b7332401e0e640e7f73b4429e4a2e2686d3af09700f141967a74","title":"ISN 2022-12: Teradici PCoIP Library Vulnerabilities","path":"/en/security-safety/current/isn-2022-12-teradici-pcoip-library-vulnerabilities","children":[]},{"id":"ci_50246929de952b2e89271d30b7e3885236c5074ff1956e8b78ae1f239e423226","title":"ISN 2022-11: VMware Horizon Privilege Escalation","path":"/en/security-safety/current/isn-2022-11-vmware-horizon-privilege-escalation","children":[]},{"id":"ci_47a79dee182a3509503869c0490f182862cea8ea31ca80d0b740c81e4a0805ca","title":"ISN 2022-10: Firefox Vulnerabilities","path":"/en/security-safety/current/isn-2022-10-firefox-vulnerabilities","children":[]},{"id":"ci_2c235a4e149c7bb6dbcba0fc96c8203e656b16c088daa98a32e0d13b955d2447","title":"ISN 2022-09: Zlib Vulnerability","path":"/en/security-safety/current/isn-2022-09-zlib-vulnerability","children":[]},{"id":"ci_714aef89bf1e8cdac45b90ad38b56fb77a5ba963f45e29abd8e2b1ad72ceb708","title":"ISN 2022-08: Chromium JavaScript Vulnerability","path":"/en/security-safety/current/isn-2022-08-chromium-javascript-vulnerability","children":[]},{"id":"ci_e512ee68b3968c963fd44d42180ce624c943f995a949e20e00f7342391e6dab3","title":"ISN 2022-07: Chromium Browser Vulnerabilities","path":"/en/security-safety/current/isn-2022-07-chromium-browser-vulnerabilities","children":[]},{"id":"ci_bc948bf39dcb3b69ffa916d87a76c48a9c64183f396a26a052a03ab188a1bd39","title":"ISN 2022-06: OpenSSL Denial of Service","path":"/en/security-safety/current/isn-2022-06-openssl-denial-of-service","children":[]},{"id":"ci_dfc031b9e40e11446f118ba3fa82b5e10ccda68166e8f5774b393b23e7db525b","title":"ISN 2022-05: Netfilter Escalation of Privilege","path":"/en/security-safety/current/isn-2022-05-netfilter-escalation-of-privilege","children":[]},{"id":"ci_74b9127f2a412cdbffe7439418e59b44f24135d42982d217e43866df09272ae4","title":"ISN 2022-04: Dirty Pipe Escalation of Privilege","path":"/en/security-safety/current/isn-2022-04-dirty-pipe-escalation-of-privilege","children":[]},{"id":"ci_f00b881dd7725877925047a0f9ebe6e3bbe3997c80501b20b7c0630336dc7db6","title":"ISN 2022-03: Glibc Denial of Service in IGEL OS","path":"/en/security-safety/current/isn-2022-03-glibc-denial-of-service-in-igel-os","children":[]},{"id":"ci_efac1bcbde26524977672c646e0a494c048e1b1b8d7badd73b1ba05a1adedd3a","title":"ISN 2022-02: UEFI Vulnerabilities in UD Devices","path":"/en/security-safety/current/isn-2022-02-uefi-vulnerabilities-in-ud-devices","children":[]},{"id":"ci_0e05775bcaf1e226d0476cc27f2888f874024605aa7381d97627444d0da76d15","title":"ISN 2022-01: Polkit Escalation of Privilege","path":"/en/security-safety/current/isn-2022-01-polkit-escalation-of-privilege","children":[]},{"id":"ci_dbfc018a03de30a8ff1a4f66758dd930c4d0256582beed220de997b2df6a49bb","title":"ISN 2021-11: UMS Log4j Vulnerability","path":"/en/security-safety/current/isn-2021-11-ums-log4j-vulnerability","children":[]},{"id":"ci_036372c593e16a75ea383c999b818209f3c7adf82c3714d982a28a3ea27b457c","title":"ISN 2021-10: Chromium vulnerabilities","path":"/en/security-safety/current/isn-2021-10-chromium-vulnerabilities","children":[]},{"id":"ci_005be928d2269db031fa55e4578da22f7a72fd815e0d0d90bad7230a1cc73cdc","title":"ISN 2021-09: Firefox ESR vulnerabilities","path":"/en/security-safety/current/isn-2021-09-firefox-esr-vulnerabilities","children":[]},{"id":"ci_7859177169f21f6423a7cb4bd508e730d5b535cf87c845530293084ebda2fb9e","title":"ISN 2021-08: ICG Authentication Vulnerability","path":"/en/security-safety/current/isn-2021-08-icg-authentication-vulnerability","children":[]},{"id":"ci_75680a716adb95d16dab5b2521e8bdd78930e61bf479ba36ccb2600373047df7","title":"ISN 2021-07: UMS Web App Information Disclosure","path":"/en/security-safety/current/isn-2021-07-ums-web-app-information-disclosure","children":[]},{"id":"ci_8c9f9535352b9777a8fedd8fce085e7eff204f79547b505795395a0f09401691","title":"ISN 2021-06: IGEL OS OpenSSH Vulnerabilities","path":"/en/security-safety/current/isn-2021-06-igel-os-openssh-vulnerabilities","children":[]},{"id":"ci_0175397a17ff3bbd4f957a4f09c3ccae1324f67643ad0912ee8e862105759581","title":"ISN 2021-05: IGEL OS Denial of Service","path":"/en/security-safety/current/isn-2021-05-igel-os-denial-of-service","children":[]},{"id":"ci_12e62441c2e3468b54e44959cfb98c1a5530c5146dac6e8e60c59a755f7b942f","title":"ISN 2021-04: IGEL OS Kernel Privilege Escalation","path":"/en/security-safety/current/isn-2021-04-igel-os-kernel-privilege-escalation","children":[]},{"id":"ci_5acb34cac8ac25fa9587e351268381d7c5cd53a0b5735171abd0553e53f77a29","title":"ISN 2021-03: IGEL W10 Print Spooler Vulnerability","path":"/en/security-safety/current/isn-2021-03-igel-w10-print-spooler-vulnerability","children":[]},{"id":"ci_0c2c56ba60cfa597871abd7646fe80211effa0950f2be670cb60a5398ebe5d29","title":"ISN 2021-02: IGEL OS and W10 Wi-Fi Vulnerabilities (Fragattacks)","path":"/en/security-safety/current/isn-2021-02-igel-os-and-w10-wi-fi-vulnerabilities-","children":[]},{"id":"ci_be18cbf6ced5640258f65e123d98b29ee9e95e545e10ff1d9432be16b754b510","title":"ISN 2021-01: IGEL OS Remote Command Execution Vulnerability","path":"/en/security-safety/current/isn-2021-01-igel-os-remote-command-execution-vulne","children":[]},{"id":"ci_d8ab31a22c4ae7119c142da77eb5dcfafdfe383d99dabbd8141d88307a84ef5e","title":"ISN 2020-10: IGEL OS Bluetooth Vulnerabilities","path":"/en/security-safety/current/isn-2020-10-igel-os-bluetooth-vulnerabilities","children":[]},{"id":"ci_9aaf4b32fe6fe2e07cf8e41a567ca8d40f78c6af9adcba49a46e236b29a9f8cc","title":"ISN 2020-09: Command Execution from Start Menu","path":"/en/security-safety/current/isn-2020-09-command-execution-from-start-menu","children":[]},{"id":"ci_3b3622ba9f3969b7d029a64255f927ce329a80805f28bb235eb4a6abd4b639dd","title":"ISN 2020-08: Firefox ESR Various Vulnerabilities","path":"/en/security-safety/current/isn-2020-08-firefox-esr-various-vulnerabilities","children":[]},{"id":"ci_831d5b722199b7fb08284256bcbd496bfcf460ab017af3f08ba07d8c0855659c","title":"ISN 2020-07: Firefox ESR Various Vulnerabilities","path":"/en/security-safety/current/isn-2020-07-firefox-esr-various-vulnerabilities","children":[]},{"id":"ci_8ad2e9679f722df855305be94eab9b767b6b132cc0b50582355aaff14d0e9d13","title":"ISN 2020-06: IGEL Cloud Gateway (ICG) Various Vulnerabilities","path":"/en/security-safety/current/isn-2020-06-igel-cloud-gateway-icg-various-vulnera","children":[]},{"id":"ci_8311b63ebf226802489d02d142411de6084f6414ea10ba06cd7495c437a10e1a","title":"ISN 2020-05: Intel Chipset Vulnerabilities","path":"/en/security-safety/current/isn-2020-05-intel-chipset-vulnerabilities","children":[]},{"id":"ci_5db4c5515d41a547f409071ce54fdf02de3aba5322c1c7c576b09a4ebbdafe87","title":"ISN 2020-04: Firefox ESR Various Vulnerabilities","path":"/en/security-safety/current/isn-2020-04-firefox-esr-various-vulnerabilities","children":[]},{"id":"ci_dc61f9da742d3534491813b2125f0131b107f9a44f51e4b3ae98c97c27b54f13","title":"ISN 2020-03: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2020-03-firefox-esr-vulnerabilities","children":[]},{"id":"ci_0d3a5994f339cc7d6a7de2c81200133a149bf39f47eb2ea15780991a8114ba79","title":"ISN 2020-02: Windows CryptoAPI Spoofing Vulnerability","path":"/en/security-safety/current/isn-2020-02-windows-cryptoapi-spoofing-vulnerabili","children":[]},{"id":"ci_0fe3c392540ee3905b6b9e38cdd9065eb223e908768607ef034955977fab479e","title":"ISN 2020-01: Firefox ESR Vulnerability","path":"/en/security-safety/current/isn-2020-01-firefox-esr-vulnerability","children":[]},{"id":"ci_a84bd840770e285edbc60debc26605c3ed59f312e74c2db09a85c6e897e7ba11","title":"ISN-2019-13: Windows Defender","path":"/en/security-safety/current/isn-2019-13-windows-defender","children":[]},{"id":"ci_918df9e9825f1d85d6b79221abb62e420d5d6361b40c059b18664de1092e1e10","title":"ISN-2019-12: Internet Explorer Vulnerability","path":"/en/security-safety/current/isn-2019-12-internet-explorer-vulnerability","children":[]},{"id":"ci_413d8967b55937e337d5a27563990d65240f173f13599fc0ebdef13e21afac27","title":"ISN 2019-11: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2019-11-firefox-esr-vulnerabilities","children":[]},{"id":"ci_47f0fc06145e1504d59b6db1631863b55c7b82dd6eac5e9d7c075ee78a5ce102","title":"ISN 2019-10: Spectre SWAPGS CPU Vulnerability","path":"/en/security-safety/current/isn-2019-10-spectre-swapgs-cpu-vulnerability","children":[]},{"id":"ci_b4da6421a59ed9bdbc039d719b9ea3e42af886c1e2ed14f8f0e606547b07f5ec","title":"ISN 2019-09: IGEL OS SWP Vulnerability","path":"/en/security-safety/current/isn-2019-09-igel-os-swp-vulnerability","children":[]},{"id":"ci_e0d7796b2377647cf77b48dc102e24787d2915e86d67a4557939503b88da0bb7","title":"ISN 2019-08: Firefox ESR Vulnerabilities","path":"/en/security-safety/current/isn-2019-08-firefox-esr-vulnerabilities","children":[]},{"id":"ci_b7d336f4273feb468d7bb7f1a588fb51278925478d1c1917127b9130995d76ec","title":"ISN 2019-07: Firefox ESR Vulnerability","path":"/en/security-safety/current/isn-2019-07-firefox-esr-vulnerability","children":[]},{"id":"ci_63b0ec80935024901cf9b9810e076ea74810c39b743bc181859b2070787a5242","title":"ISN 2019-06: IGEL OS Kernel Vulnerability","path":"/en/security-safety/current/isn-2019-06-igel-os-kernel-vulnerability","children":[]},{"id":"ci_b8138b847373e433e53002654e6a84c491f1f9f310311651905a1b401e92a36d","title":"ISN 2019-05: UMS HA Vulnerability","path":"/en/security-safety/current/isn-2019-05-ums-ha-vulnerability","children":[]},{"id":"ci_9baf6893cb9254fa0ea92f97ea89343bf52f66d63ef9405e3ee2c9bd6a52147a","title":"ISN 2019-04: RDP Vulnerability in WES7","path":"/en/security-safety/current/isn-2019-04-rdp-vulnerability-in-wes7","children":[]},{"id":"ci_47c298999d2063d02d60d5481aee475e0c4a42d3d301b7e8f0f277504a0d0236","title":"ISN 2019-03: Zombieload, RIDL, Fallout","path":"/en/security-safety/current/isn-2019-03-zombieload-ridl-fallout","children":[]},{"id":"ci_1d23afff3c7b686d7759c6f36dd989e3ff2db51c5dad5e787921e1d1412a9fde","title":"ISN 2019-02: UMS Vulnerability","path":"/en/security-safety/current/isn-2019-02-ums-vulnerability","children":[]},{"id":"ci_d1c07e26975da77573c2fddc4c25d9bec03f6e20f34b2f094495ea3b0e6e5ade","title":"ISN 2019-01: UMS Vulnerability","path":"/en/security-safety/current/isn-2019-01-ums-vulnerability","children":[]}]},{"id":"ci_02a1991ad47b4bc08e913090879ad5f3583214eff146eb54748260e945d22d50","title":"IGEL OS 12 Hardening Guide","path":"/en/security-safety/current/igel-os-12-hardening-guide","children":[{"id":"ci_a66b97ced5ca1c0897c38987ae5806a8b3a839b0af8ca033f5355f3fea2a0bcf","title":"Security Introduction","path":"/en/security-safety/current/security-introduction","children":[]},{"id":"ci_49dbc1978480338ba4e5806ed70e60993a3f89ce194f9a914a4cb6228b2b4e42","title":"Setting Passwords","path":"/en/security-safety/current/setting-passwords","children":[{"id":"ci_e8e809770d66af979125f8b9fa68cfa8e17b3363284a95c9987f14cede5c3d55","title":"Setting an Administrator Password","path":"/en/security-safety/current/setting-an-administrator-password","children":[]},{"id":"ci_8afaa68643b639332da4fd772625c629f1aa474c90ebae5eaf43d7ee1d2b9008","title":"Enforcing User Authentication at the Device","path":"/en/security-safety/current/enforcing-user-authentication-at-the-device","children":[]},{"id":"ci_8004a69548a40f9e79ff1455d6688e0968c2f06af4083fbfbf78f14a48125dbf","title":"Password-Protecting Sessions and Accessories","path":"/en/security-safety/current/password-protecting-sessions-and-accessories","children":[]},{"id":"ci_b4381f664da1bc57db743f7ae52025ebef4221a4f8c5ea545b471086c23a561e","title":"Using Screenlock","path":"/en/security-safety/current/using-screenlock","children":[]},{"id":"ci_585a8c8066aac767c6c383bcf952d33f65f1369c9a5bb80d29e55ee6495f8fe5","title":"Setting a UEFI Password","path":"/en/security-safety/current/setting-a-uefi-password","children":[]},{"id":"ci_de1b5d8c121b280481ccc8bb063ea7f83cfcece1e2a06cec538dd1b50aba7bc7","title":"Using Two-Factor Authentication (2FA)","path":"/en/security-safety/current/using-two-factor-authentication-2fa","children":[]}]},{"id":"ci_bd397f35421faa731894cb550a21ad12146e92f05359252993658f4577d4f5e3","title":"How to Keep the System Up-To-Date","path":"/en/security-safety/current/how-to-keep-the-system-up-to-date","children":[]},{"id":"ci_6dfd9f0f4ac34a5dd112eac795fc376beeb77cfb246a78caa8f9f99bd9383a08","title":"Disabling Access to Components","path":"/en/security-safety/current/disabling-access-to-components","children":[{"id":"ci_fbf5b2f0a513f3c7d673e92412fef327dd63f383f79eedc1b3046adeba30722c","title":"Disabling Local Terminal Access","path":"/en/security-safety/current/disabling-local-terminal-access","children":[]},{"id":"ci_6843680bf6b92e8ef7595f450e855fab46dd1c54c10b3dec8831f8547d62601e","title":"Disabling Virtual Console Access","path":"/en/security-safety/current/disabling-virtual-console-access","children":[]},{"id":"ci_f87e013325be84a2a3f053943a77e324a1f3cf37935960e1466e3e4fe4a5a6e8","title":"Hiding Unused Accessories","path":"/en/security-safety/current/hiding-unused-accessories","children":[]},{"id":"ci_0a791896c6140bd4291d248945d35b4ccc080bc4462e7dd4d336f7e50ba639b2","title":"Use Strong Device Encryption Settings","path":"/en/security-safety/current/use-strong-device-encryption-settings","children":[]}]},{"id":"ci_5970bc3c9949b82c198827e962da45e37fc1fabd895dcf7d8f1fd3150ab04aab","title":"Minimizing the Attack Surface","path":"/en/security-safety/current/minimizing-the-attack-surface","children":[{"id":"ci_1c843b3b3ce4f848aa1bf4caf77cdbe2ef4d9e0549186508b84fe3d7a959d307","title":"Secure App Choices","path":"/en/security-safety/current/secure-app-choices","children":[]},{"id":"ci_6bfdc1de542eb38e1f0aa055bec3f170fee90f00ecc6bbb72327b73ffbe121f2","title":"Using Browser Kiosk Mode","path":"/en/security-safety/current/using-browser-kiosk-mode","children":[]},{"id":"ci_59fe24419445ed3505544d690da5cd3f78da49ca11cb506dd9670154c88e0fe4","title":"Disabling the PC/SC Daemon","path":"/en/security-safety/current/disabling-the-pc-sc-daemon","children":[]},{"id":"ci_5290bf5ff7b637e6658b3bfdb9b695fd22b72c8776095447993a004b86f0198b","title":"Disabling X Server TCP Connections","path":"/en/security-safety/current/disabling-x-server-tcp-connections","children":[]},{"id":"ci_6f30270b9d889e8ccf8d67d764596d45e4306929f025f474c643d76bd7e4c67a","title":"Disabling RPC Portmapper Service","path":"/en/security-safety/current/disabling-rpc-portmapper-service","children":[]},{"id":"ci_9f7fbf927069185b879f99f7f25fc1a17efb35aea75263fcad1fb72b0263a538","title":"Disabling Storage Hotplug","path":"/en/security-safety/current/disabling-storage-hotplug","children":[]},{"id":"ci_9f9db92859415ddac76204792b98429821a579c5ceb0b60a031a7ceafd5d31fb","title":"Using USB Device Control","path":"/en/security-safety/current/using-usb-device-control","children":[]},{"id":"ci_166dc5da09eee3800ed5a7552a7605dc49567c15da892ec945feee408acf8887","title":"Disabling USB Boot","path":"/en/security-safety/current/disabling-usb-boot","children":[]}]},{"id":"ci_591b6bd1784d06130ebac9564b8a6b11a1fce926dcdc7f28f6a8387eb4047457","title":"Configuring Remote Access and Management","path":"/en/security-safety/current/configuring-remote-access-and-management","children":[{"id":"ci_dd73e641c2ba1a469e3ec0764024dedd89a671cdb3064cc89d39deefd24eebc8","title":"Tying Endpoints to Your UMS instance","path":"/en/security-safety/current/tying-endpoints-to-your-ums-instance","children":[]},{"id":"ci_20fae5f39b815c8194ef5775c3a2933dc458807b7dacf688d909440d3d588a28","title":"Using Secure Shadowing","path":"/en/security-safety/current/using-secure-shadowing","children":[]},{"id":"ci_bc706bc23306395942287dba66f62f6bf065d98726e942047603c355cf5d2d78","title":"Disabling Secure Terminal","path":"/en/security-safety/current/disabling-secure-terminal","children":[]},{"id":"ci_8bcf911fb181db169770c96d245a04d7ce1f69c6a7706a7e6cf1084a3120f056","title":"Using Public Key Authentication","path":"/en/security-safety/current/using-public-key-authentication","children":[]}]},{"id":"ci_7a7d85e2bb9b90e59759668337941d02f3b2abf5d90d951abac6ba56132e70ac","title":"Wi-Fi and Bluetooth","path":"/en/security-safety/current/wi-fi-and-bluetooth","children":[{"id":"ci_38a857f9691637017a9dce2d7598af9d6829992cdce6a70b6a593372c74757fe","title":"Restricting Wi-Fi Access","path":"/en/security-safety/current/restricting-wi-fi-access","children":[]},{"id":"ci_93c7a081d0b422d895b828ae1e9fe66b949fd587edbf39b50b9a5e301316bd5d","title":"Bluetooth","path":"/en/security-safety/current/bluetooth","children":[]}]},{"id":"ci_3a8ec3c89ed72e1039554bc16154c917284ee36cfb3ac00455c27e87fd12fc2e","title":"Network Security","path":"/en/security-safety/current/network-security","children":[]},{"id":"ci_73e747c9b6ffe595cd0bff9e68771698521289a95e0a3d2c0c3366805d54e654","title":"Using IGEL UD Pocket for BYOD Devices","path":"/en/security-safety/current/using-igel-ud-pocket-for-byod-devices","children":[]}]},{"id":"ci_1762107fb2152514ac9acb91a56880fcea9b96f538d6d424cbd404af078fe95e","title":"Product Security Archive","path":"/en/security-safety/current/product-security-archive","children":[]},{"id":"ci_f513b0807d338969ae5e9b14e3b08006b175ed37518d1a234ba146e34b75a7e3","title":"Reporting Vulnerabilities in IGEL Products","path":"/en/security-safety/current/reporting-vulnerabilities-in-igel-products","children":[]},{"id":"ci_688fa6343228a3e43033c6589edf6577fb41a86babcd47cb94588189d56ff9e2","title":"UEFI Secure Boot Enabling Guides","path":"/en/security-safety/current/uefi-secure-boot-enabling-guides","children":[{"id":"ci_abe765b933b0619882c31c29078f7efb5cd4e87dc9de2315a7d2f54a4dcce2dd","title":"IGEL OS","path":"/en/security-safety/current/igel-os","children":[{"id":"ci_4d64bf12d85fe82471110ff1aa63a875543b2a18d253975dcf28dd778f808eaa","title":"Enabling UEFI Secure Boot in UD2-LX 40","path":"/en/security-safety/current/enabling-uefi-secure-boot-in-ud2-lx-40","children":[]},{"id":"ci_2816e5a8c2466ce2e611e534230f86ac3d8e7edb67b55c652cefbda4f961acf1","title":"Enabling UEFI Secure Boot in UD2-LX 50/51","path":"/en/security-safety/current/enabling-uefi-secure-boot-in-ud2-lx-50-51","children":[]},{"id":"ci_daca5093a0ccb6f1d75d9ba050972ca45152df53ad324d7d4635eeef911b6697","title":"Enabling UEFI Secure Boot in UD3-LX 50","path":"/en/security-safety/current/enabling-uefi-secure-boot-in-ud3-lx-50","children":[]},{"id":"ci_dfa95415c9bcc390890b2828dd3de7fc02663cd6da4448fa4eb0db4037a1cd1d","title":"Enabling UEFI Secure Boot in UD3-LX 51","path":"/en/security-safety/current/enabling-uefi-secure-boot-in-ud3-lx-51","children":[]},{"id":"ci_54aea6ed1a8da80d269d4557db85c692b8d46448adc9dde50a7fcb495685f005","title":"Enabling UEFI Secure Boot in UD3-LX 60","path":"/en/security-safety/current/enabling-uefi-secure-boot-in-ud3-lx-60","children":[]},{"id":"ci_442639b4fb0805eb0be4f803549cd9d84fb13c77280c571bc679c153c2bfd713","title":"Enabling UEFI Secure Boot in UD6-LX 51","path":"/en/security-safety/current/enabling-uefi-secure-boot-in-ud6-lx-51","children":[]},{"id":"ci_f9b7e590b5e7579f26bc5274e577ae36f650176bef89ddea81baedf8dd512db3","title":"Enabling UEFI Secure Boot in UD7-LX 10","path":"/en/security-safety/current/enabling-uefi-secure-boot-in-ud7-lx-10","children":[]},{"id":"ci_7e30bc371b4e410315fe70b3fc9687b041212497d6fcac77b8847208b63aa742","title":"Enabling UEFI Secure Boot in UD7-LX 20","path":"/en/security-safety/current/enabling-uefi-secure-boot-in-ud7-lx-20","children":[]}]},{"id":"ci_0a5efb7f59c28f4cc98452a651e46b7801f05d57c8366c728626378d00c9b1df","title":"Microsoft Windows 10 IoT","path":"/en/security-safety/current/microsoft-windows-10-iot","children":[{"id":"ci_d3385d11dec7160ace8119716cec6e31967152d2a9a651023d3d29e571f598bf","title":"Enabling UEFI Secure Boot in UD3-W10 51","path":"/en/security-safety/current/enabling-uefi-secure-boot-in-ud3-w10-51","children":[]},{"id":"ci_26575471a812892fe950d873658f5fe815b41e1c0628a340515d87e64777ff6d","title":"Enabling UEFI Secure Boot in UD6-W10 51","path":"/en/security-safety/current/enabling-uefi-secure-boot-in-ud6-w10-51","children":[]},{"id":"ci_5fdce7c9edde2cc78378b668d3a0bd898ffa8ede1d06d2bdf6fe41742b9abfd2","title":"Enabling UEFI Secure Boot in UD7-W10 10","path":"/en/security-safety/current/enabling-uefi-secure-boot-in-ud7-w10-10","children":[]}]},{"id":"ci_37b67c5318cb922222017794b85ba8ef43983441b0c9427df4e69e43ce2acf0d","title":"Verifying that Secure Boot is Enabled","path":"/en/security-safety/current/verifying-that-secure-boot-is-enabled","children":[]},{"id":"ci_9d161c36c2226724b847f97dbc3bc88524ae5c7014e9f575e26aaaf3f139a1ec","title":"Secured-Core PCs: Microsoft 3rd-Party UEFI Certificate for Secure Boot","path":"/en/security-safety/current/secured-core-pcs-microsoft-3rd-party-uefi-certific","children":[]}]},{"id":"ci_f05852ba0c31a6bace44f5d98171217ac19fb6800be1db0fb419ace15499ec66","title":"AMD Secure Processor","path":"/en/security-safety/current/amd-secure-processor","children":[{"id":"ci_27550a05e8de638a528684c6c5adfdf531e9abb352d88044916dff65868c97e4","title":"UD7 Model H850C","path":"/en/security-safety/current/ud7-model-h850c","children":[]}]},{"id":"ci_32ac758909b68bf5aee7d201dab302b261ce35f5a5426a3e45ceeb204d82bc4d","title":"AMD Memory Guard","path":"/en/security-safety/current/amd-memory-guard","children":[]},{"id":"ci_8877bdca14d2dddeee19c44facf7968a73c2ffccee7047394dbebbc6d5b3c299","title":"BSI Grundschutz","path":"/en/security-safety/current/bsi-grundschutz","children":[{"id":"ci_ed1af6d28cb8d4c143d42a766e3f1a1851d60b756eafb5f7ee49029c60c2388d","title":"Anleitung zum IT-Grundschutz-konformen Betrieb von IGEL OS 11.03.100","path":"/en/security-safety/current/anleitung-zum-it-grundschutz-konformen-betrieb-von","children":[{"id":"ci_85847b5272a5f89b49f2cc060be9b1732204a5d278cc0cb51ce19343d6cdb1b4","title":"Über dieses Dokument","path":"/en/security-safety/current/uber-dieses-dokument","children":[]},{"id":"ci_d96b00cf16ca374e3a2f9b422de179ed9a4e98f7bd1244d83a8f9971f50610c6","title":"Grundsätzliche Vorgaben zur Administration","path":"/en/security-safety/current/grundsatzliche-vorgaben-zur-administration","children":[]},{"id":"ci_85c307cdeb3722c296e7753197f2e9c2960929cc28501ee5fd8ff51c9c784d99","title":"Fernwartung","path":"/en/security-safety/current/fernwartung","children":[]},{"id":"ci_4d8ebb584240496f92c297831321d11ee8543f9678a9c63e552f6b3f2affa05b","title":"Zugriffskontrolle","path":"/en/security-safety/current/zugriffskontrolle","children":[]},{"id":"ci_43e58a772dac7b22d17b20e5590997c3becce3e06177db2b44024ebb9e282b31","title":"Absicherung des Bootvorgangs","path":"/en/security-safety/current/absicherung-des-bootvorgangs","children":[]},{"id":"ci_c1e576de9cfd0bf28d5d6fc6b286080d99256136a1f53be9aa137a4ccf470a68","title":"Schutz bei Diebstahl oder Defekt","path":"/en/security-safety/current/schutz-bei-diebstahl-oder-defekt","children":[]},{"id":"ci_675a7a339abd94349907c7e6c04024b6224e514624b56fc659b87b6768593830","title":"Schutz vor Manipulation","path":"/en/security-safety/current/schutz-vor-manipulation","children":[]},{"id":"ci_a8cab3bae94bf4ac65804fcf812936f631eafac10c4e1c55e5879f25c09ce220","title":"Einschränken der Benutzerumgebung","path":"/en/security-safety/current/einschranken-der-benutzerumgebung","children":[]},{"id":"ci_5ad807841e44718fc8542bb0103b467e334d1cf5fd27d5f91408d94e52683d36","title":"Protokollierung und Protokollauswertung","path":"/en/security-safety/current/protokollierung-und-protokollauswertung","children":[]},{"id":"ci_902594c0ebeb6f90a1e7e99fb7e80219b535b15ecd32b639f0a12baf4189bc76","title":"Datensicherung","path":"/en/security-safety/current/datensicherung","children":[]},{"id":"ci_dfd16bd7a628438f0c2d91af2d1b5b8af44591d139514d43807bc3e8026eec04","title":"Verschlüsselung","path":"/en/security-safety/current/verschlusselung","children":[]},{"id":"ci_b87856a66feedec4441d80f9d80260061ea7bc7a180c89e70fbf9ec47777806e","title":"Virenschutz","path":"/en/security-safety/current/virenschutz","children":[]},{"id":"ci_2475135e06510834c82a2b8beb006d3194e8f4d37bcfe743201fc41652dfdaa1","title":"Systempflege","path":"/en/security-safety/current/systempflege","children":[]},{"id":"ci_ed161bd6cea24d7002b3cc000b4fee8fe9dbc24cb8ba2b3b092cdcacc6529d04","title":"Zusätzliche Anforderungen aus SYS.2","path":"/en/security-safety/current/zusatzliche-anforderungen-aus-sys-2","children":[]},{"id":"ci_53ed06d938abb0ea7849ebf79c810d805d2909d547662de426c4c8a623405ed7","title":"Logging and Log Evaluation","path":"/en/security-safety/current/logging-and-log-evaluation","children":[]}]},{"id":"ci_b99eb2dd6e1a0d4e85a4ba5b2adfcfbec43058b220a9046859d95303cc4e4938","title":"Anleitung zum IT-Grundschutz-konformen Betrieb von IGEL OS 12","path":"/en/security-safety/current/anleitung-zum-it-grundschutz-konformen-betrieb-v-1","children":[{"id":"ci_964b2989d0af0e4491fd2365bada2567bcfdb57813128ecab7f94d2537d134a9","title":"Über das Dokument","path":"/en/security-safety/current/uber-das-dokument","children":[]},{"id":"ci_f28d1fb1ff606b94fe57563ecd86dd6af68e04432473eda4705be3f56335a0e4","title":"OPS.1.1.2 Ordnungsgemäße IT-Administration","path":"/en/security-safety/current/ops-1-1-2-ordnungsgemae-it-administration","children":[{"id":"ci_af8a92a614687f5e40764d77968a6a6e52ee1ecbacd015218c220e064848908d","title":"Standard-Anforderungen von OPS.1.1.2","path":"/en/security-safety/current/standard-anforderungen-von-ops-1-1-2","children":[]},{"id":"ci_2eaa06746eda9131bcb9f7b17292f829812d433e610fbd031cd811f6475bf1dd","title":"Anforderungen bei erhöhtem Schutzbedarf von OPS.1.1.2","path":"/en/security-safety/current/anforderungen-bei-erhohtem-schutzbedarf-von-ops-1-","children":[]},{"id":"ci_c27f7496a81e472fb7c1203abe861b42fc5b546d25780b8e804489237af06b87","title":"Basis-Anforderungen von OPS.1.1.2","path":"/en/security-safety/current/basis-anforderungen-von-ops-1-1-2","children":[]}]},{"id":"ci_bdaefc8012d8566019f099d0de3b076b5c6fb0d1f207f085bbc43a6ae4e0a246","title":"OPS.1.1.3 Patch- und Änderungsmanagement","path":"/en/security-safety/current/ops-1-1-3-patch-und-anderungsmanagement","children":[{"id":"ci_b6d292cfc7130fb13e78087c96c632c9d3756d7ce8e664b2fe8fd59340a5df9e","title":"Basis-Anforderungen von OPS.1.1.3","path":"/en/security-safety/current/basis-anforderungen-von-ops-1-1-3","children":[]},{"id":"ci_89e18256b87c0c1b8fee4375b54c07072084d1f7f1352c92d7a3fc171e3dec81","title":"Standard-Anforderungen von OPS.1.1.3","path":"/en/security-safety/current/standard-anforderungen-von-ops-1-1-3","children":[]},{"id":"ci_a0c8dac36cef37398b4c9dd94220079883dd61b9a4e984627e6d508963a88d80","title":"Anforderungen bei erhöhtem Schutzbedarf von OPS.1.1.3","path":"/en/security-safety/current/anforderungen-bei-erhohtem-schutzbedarf-von-ops--1","children":[]}]},{"id":"ci_77d90b75049c463c2c31edc82349e6af64c6f33e36e6b9601e98ebf4afcb1532","title":"OPS.1.1.4 Schutz vor Schadprogrammen","path":"/en/security-safety/current/ops-1-1-4-schutz-vor-schadprogrammen","children":[{"id":"ci_ffdc591be84ea31d4864647d20fe85dcd0db2aab82f6b7c90fd668bd1db1bcfc","title":"Basis-Anforderungen von OPS.1.1.4","path":"/en/security-safety/current/basis-anforderungen-von-ops-1-1-4","children":[]}]},{"id":"ci_2f4a093dbcd57d48d227ee2bb7b03aa5df427157721356524ecf3059e2190195","title":"OPS.1.1.5 Protokollierung","path":"/en/security-safety/current/ops-1-1-5-protokollierung","children":[{"id":"ci_9e49613958858686ca9ce1eb579f21ce8472215d4ab730fecce0cc2d2c9ec380","title":"Basis-Anforderungen von OPS.1.1.5","path":"/en/security-safety/current/basis-anforderungen-von-ops-1-1-5","children":[]}]},{"id":"ci_c2f944a662e83327f69b2e87e6611175da728b04b6daf849071589b9622ba364","title":"OPS.1.2.5 Fernwartung","path":"/en/security-safety/current/ops-1-2-5-fernwartung","children":[{"id":"ci_ffb6486204e363f39d2feaf7da9443ec75e88ae081e78d6b219ad4aa023cc1b7","title":"Standard-Anforderungen von OPS.1.2.5","path":"/en/security-safety/current/standard-anforderungen-von-ops-1-2-5","children":[]},{"id":"ci_8a7c5602b6dc55e2c62a6bfd51cbbcc8d4ba7d1b1d67c809bdac303631af33b2","title":"Anforderungen bei erhöhtem Schutzbedarf von OPS1.2.5","path":"/en/security-safety/current/anforderungen-bei-erhohtem-schutzbedarf-von-ops1-2","children":[]}]},{"id":"ci_f68fff84b7b770e1da6bc9a7fdfb159e8a86a2038822804b0f24ff5bccbccb16","title":"SYS.2.1 Allgemeiner Client","path":"/en/security-safety/current/sys-2-1-allgemeiner-client","children":[{"id":"ci_1b3ccc515dbfc31161d87b959df46acddc70b41a673fc78b7e343fe3437ffd60","title":"Basis-Anforderungen von SYS.2.1","path":"/en/security-safety/current/basis-anforderungen-von-sys-2-1","children":[]},{"id":"ci_6291d6449bb8ab2b020b5181aae9830746879fdf8f5f880848c43c9fabae5c41","title":"Standard-Anforderungen von SYS.2.1","path":"/en/security-safety/current/standard-anforderungen-von-sys-2-1","children":[]},{"id":"ci_69b87e1e3b02635d009aa31480a7b2cec0b8d72d298df6d85e32e30da548892f","title":"Anforderungen bei erhöhtem Schutzbedarf von SYS.2.1","path":"/en/security-safety/current/anforderungen-bei-erhohtem-schutzbedarf-von-sys--1","children":[]}]},{"id":"ci_05bd9445c3bfcc4e833e0f1abe0d87ef463fd31441a819f2b69de0f3073e4145","title":"SYS.2.3 Clients unter Linux und Unix","path":"/en/security-safety/current/sys-2-3-clients-unter-linux-und-unix","children":[{"id":"ci_748ecc803baa63278a3e10e604699786a0e04c256d0488dba5e74c9f4857f216","title":"Standard-Anforderungen von SYS.2.3","path":"/en/security-safety/current/standard-anforderungen-von-sys-2-3","children":[]},{"id":"ci_702525c86670e5f3744849090db0b095ac6d0640961b2006a6767e4192a24153","title":"Anforderungen bei erhöhtem Schutzbedarf von SYS.2.3","path":"/en/security-safety/current/anforderungen-bei-erhohtem-schutzbedarf-von-sys-2-","children":[]},{"id":"ci_3a26b0ce9821ffba54e0dc938cac2a42f51f791ad8ee55d1b75512ecd02937c9","title":"Basis-Anforderungen von SYS.2.3","path":"/en/security-safety/current/basis-anforderungen-von-sys-2-3","children":[]}]},{"id":"ci_2fd6b60415e91b81e6277cf951974cd59115d78913edec10edc63de047a6911d","title":"Weitere relevante Anforderungen","path":"/en/security-safety/current/weitere-relevante-anforderungen","children":[]}]}]},{"id":"ci_ea398bbeccc8fab53aaa27812901c4d6c5886da0b2276809af9ee4e3cf15bff3","title":"Parental Control Settings for IGEL OS","path":"/en/security-safety/current/parental-control-settings-for-igel-os","children":[]},{"id":"ci_c564a564e3abc75f58e43125cd7bcf86410e4eb479610fe54c0ac078d172a103","title":"Xz Backdoor (CVE-2024-3094) Does Not Affect IGEL OS 11 and OS 12","path":"/en/security-safety/current/xz-backdoor-cve-2024-3094-does-not-affect-igel-os-","children":[]}]