Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-20628 |
7.1 (3.1)
|
A permissions issue was addressed with additional… |
Apple |
macOS |
2026-02-11T22:58:50.798Z | 2026-02-12T19:17:41.510Z |
| CVE-2026-20669 |
5.5 (3.1)
|
A parsing issue in the handling of directory path… |
Apple |
macOS |
2026-02-11T22:58:51.771Z | 2026-02-12T19:14:44.879Z |
| CVE-2026-20612 |
5.5 (3.1)
|
A privacy issue was addressed with improved check… |
Apple |
macOS |
2026-02-11T22:58:52.712Z | 2026-02-12T19:13:35.179Z |
| CVE-2026-20645 |
4.6 (3.1)
|
An inconsistent user interface issue was addresse… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:53.527Z | 2026-02-12T19:11:11.631Z |
| CVE-2020-37173 |
8.7 (4.0)
7.5 (3.1)
|
AVideo Platform 8.1 - Information Disclosure (User Enu… |
AVideo |
AVideo Platform |
2026-02-11T20:36:58.062Z | 2026-02-12T19:09:54.400Z |
| CVE-2026-20653 |
5.5 (3.1)
|
A parsing issue in the handling of directory path… |
Apple |
macOS |
2026-02-11T22:58:55.426Z | 2026-02-12T19:08:38.616Z |
| CVE-2026-20648 |
5.5 (3.1)
|
A privacy issue was addressed by moving sensitive… |
Apple |
macOS |
2026-02-11T22:59:01.808Z | 2026-02-12T19:02:26.865Z |
| CVE-2025-69807 |
7.5 (3.1)
|
p2r3 Bareiron commit: 8e4d4020d is vulnerable to … |
n/a |
n/a |
2026-02-12T00:00:00.000Z | 2026-02-12T19:01:33.622Z |
| CVE-2025-20360 |
5.8 (3.1)
|
Multiple Cisco Products Snort 3 MIME Denial of Service… |
Cisco |
Cisco Cyber Vision |
2025-10-15T16:19:46.840Z | 2026-02-12T18:57:32.487Z |
| CVE-2025-20359 |
6.5 (3.1)
|
Multiple Cisco Products Snort 3 MIME Information Discl… |
Cisco |
Cisco Cyber Vision |
2025-10-15T16:17:31.374Z | 2026-02-12T18:57:32.563Z |
| CVE-2025-70981 |
9.8 (3.1)
|
CordysCRM 1.4.1 is vulnerable to SQL Injection in… |
n/a |
n/a |
2026-02-12T00:00:00.000Z | 2026-02-12T18:53:23.323Z |
| CVE-2026-20119 |
7.5 (3.1)
|
Cisco TelePresence Collaboration Endpoint Software and… |
Cisco |
Cisco RoomOS Software |
2026-02-04T16:12:04.796Z | 2026-02-12T18:49:48.060Z |
| CVE-2026-20026 |
5.8 (3.1)
|
Multiple Cisco Products Snort 3 DCERPC Vulnerabilities |
Cisco |
Cisco Secure Firewall Threat Defense (FTD) Software |
2026-01-07T16:23:43.283Z | 2026-02-12T18:48:34.084Z |
| CVE-2026-20027 |
5.3 (3.1)
|
Cisco Snort DCERPC Stub Data Out of Bounds Read |
Cisco |
Cisco Secure Firewall Threat Defense (FTD) Software |
2026-01-07T16:23:43.301Z | 2026-02-12T18:48:32.446Z |
| CVE-2020-37172 |
8.5 (4.0)
5.3 (3.1)
|
AVideo Platform 8.1 - Cross Site Request Forgery (Pass… |
AVideo |
AVideo Platform |
2026-02-11T20:33:33.722Z | 2026-02-12T18:48:14.759Z |
| CVE-2026-1507 |
7.5 (3.1)
8.7 (4.0)
|
Uncaught Exception vulnerability in AVEVA PI Data Archive |
AVEVA |
PI Data Archive PI Server |
2026-02-10T20:19:18.886Z | 2026-02-12T18:47:05.938Z |
| CVE-2026-1495 |
6.5 (3.1)
5.7 (4.0)
|
Insertion of Sensitive Information into Log File vulne… |
AVEVA |
PI to CONNECT Agent |
2026-02-10T20:18:10.844Z | 2026-02-12T18:46:41.102Z |
| CVE-2026-21434 |
5.3 (3.1)
|
webtransport-go affected by Memory Exhaustion Attack d… |
quic-go |
webtransport-go |
2026-02-12T18:18:04.821Z | 2026-02-12T18:45:58.158Z |
| CVE-2025-54756 |
8.4 (3.1)
8.6 (4.0)
|
BrightSign Players Use of Default Credentials |
BrightSign |
BrightSign OS series 4 players |
2026-02-12T16:34:18.821Z | 2026-02-12T18:45:20.986Z |
| CVE-2020-37182 |
8.7 (4.0)
7.5 (3.1)
|
Redir 3.3 - Denial of Service |
troglobit |
Redir |
2026-02-11T20:37:05.294Z | 2026-02-12T18:44:35.469Z |
| CVE-2020-37181 |
6.7 (4.0)
9.8 (3.1)
|
Torrent FLV Converter 1.51 Build 117 - Stack Oveflow (… |
TorrentRockYou |
Torrent FLV Converter |
2026-02-11T20:37:04.501Z | 2026-02-12T18:43:44.651Z |
| CVE-2020-37180 |
4.6 (4.0)
7.5 (3.1)
|
GTalk Password Finder 2.2.1 - 'Key' Denial of Service |
Nsasoft |
Nsauditor GTalk Password Finder |
2026-02-11T20:37:03.684Z | 2026-02-12T18:40:24.839Z |
| CVE-2020-37185 |
4.6 (4.0)
7.5 (3.1)
|
Backup Key Recovery 2.2.5 - 'Name' Denial of Service |
Nsasoft |
Nsauditor Backup Key Recovery |
2026-02-11T20:37:07.959Z | 2026-02-12T18:36:54.158Z |
| CVE-2023-31323 |
8.4 (4.0)
|
Type confusion in the AMD Secure Processor (ASP) … |
AMD |
AMD Radeon™ RX 5000 Series Graphics Products |
2026-02-12T17:45:12.151Z | 2026-02-12T18:33:47.900Z |
| CVE-2025-54519 |
7.3 (3.1)
|
A DLL hijacking vulnerability in Doc Nav could al… |
AMD |
Vivado™ Documentation Navigator Installation (Windows) |
2026-02-12T17:46:43.887Z | 2026-02-12T18:29:48.287Z |
| CVE-2023-20601 |
4.6 (4.0)
|
Improper input validation within RAS TA Driver ca… |
AMD |
AMD Radeon™ PRO VII |
2026-02-12T17:31:40.694Z | 2026-02-12T18:19:23.782Z |
| CVE-2026-20625 |
5.5 (3.1)
|
A parsing issue in the handling of directory path… |
Apple |
macOS |
2026-02-11T22:59:02.747Z | 2026-02-12T17:52:48.700Z |
| CVE-2024-36355 |
7 (4.0)
|
Improper input validation in the SMM handler coul… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:28:04.884Z | 2026-02-12T17:49:05.987Z |
| CVE-2026-20605 |
4.6 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
macOS |
2026-02-11T22:59:03.734Z | 2026-02-12T17:48:34.491Z |
| CVE-2026-2391 |
6.3 (4.0)
3.7 (3.1)
|
qs's arrayLimit bypass in comma parsing allows denial … |
|
|
2026-02-12T04:39:42.914Z | 2026-02-12T17:32:05.953Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-36522 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) C… |
n/a |
Intel(R) Chipset Software |
2026-02-10T16:26:06.496Z | 2026-02-10T17:27:56.920Z |
| CVE-2025-36511 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) M… |
n/a |
Intel(R) Memory and Storage Tool |
2026-02-10T16:26:04.601Z | 2026-02-11T04:56:53.066Z |
| CVE-2025-35999 |
6.7 (3.1)
|
Incorrect permission assignment for critical reso… |
n/a |
System Firmware Update Utility (SysFwUpdt) for Intel(R) Server Boards and Intel(R) Server Systems Based |
2026-02-10T16:26:02.912Z | 2026-02-11T04:56:26.209Z |
| CVE-2025-35998 |
7.9 (3.1)
|
Missing protection mechanism for alternate hardwa… |
n/a |
Intel(R) Platforms |
2026-02-10T16:26:00.829Z | 2026-02-11T04:56:22.180Z |
| CVE-2025-35992 |
4.7 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:58.837Z | 2026-02-10T17:31:21.016Z |
| CVE-2025-33030 |
3.3 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:57.278Z | 2026-02-12T04:55:25.987Z |
| CVE-2025-32739 |
2.8 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) Graphics Drivers and Intel LTS kernels |
2026-02-10T16:25:55.444Z | 2026-02-10T17:31:52.116Z |
| CVE-2025-32735 |
5.5 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:53.478Z | 2026-02-10T17:32:07.026Z |
| CVE-2025-32467 |
4.1 (3.1)
|
Use of uninitialized variable for some TDX Module… |
n/a |
TDX Module |
2026-02-10T16:25:51.854Z | 2026-02-10T17:32:20.724Z |
| CVE-2025-32453 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) G… |
n/a |
Intel(R) Graphics Driver software |
2026-02-10T16:25:50.100Z | 2026-02-11T04:56:27.819Z |
| CVE-2025-32452 |
6.7 (3.1)
|
Uncontrolled search path for some AI Playground b… |
n/a |
AI Playground |
2026-02-10T16:25:48.428Z | 2026-02-10T18:50:32.720Z |
| CVE-2025-32092 |
6.7 (3.1)
|
Insecure inherited permissions for some Intel(R) … |
n/a |
Intel(R) Graphics Software |
2026-02-10T16:25:46.732Z | 2026-02-11T04:56:27.050Z |
| CVE-2025-32008 |
8.6 (3.1)
|
Out-of-bounds write in the firmware for the Intel… |
n/a |
Intel(R) AMT and Intel(R) Standard Manageability |
2026-02-10T16:25:44.946Z | 2026-02-10T18:46:48.862Z |
| CVE-2025-32007 |
4.4 (3.1)
|
Out-of-bounds read for some TDX before version td… |
n/a |
TDX |
2026-02-10T16:25:43.166Z | 2026-02-10T18:39:01.377Z |
| CVE-2025-32003 |
6.5 (3.1)
|
Out-of-bounds read in the firmware for some 100Gb… |
n/a |
100GbE Intel(R) Ethernet Network Adapter E810 |
2026-02-10T16:25:41.432Z | 2026-02-10T18:37:59.640Z |
| CVE-2025-31944 |
5.3 (3.1)
|
Race condition for some TDX Module before version… |
n/a |
TDX Module |
2026-02-10T16:25:39.802Z | 2026-02-10T18:33:57.653Z |
| CVE-2025-31655 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) B… |
n/a |
Intel(R) Battery Life Diagnostic Tool |
2026-02-10T16:25:37.949Z | 2026-02-10T17:33:31.501Z |
| CVE-2025-31648 |
3.9 (3.1)
|
Improper handling of values in the microcode flow… |
n/a |
Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts. |
2026-02-10T16:25:36.350Z | 2026-02-11T04:56:25.392Z |
| CVE-2025-30513 |
7.9 (3.1)
|
Race condition for some TDX Module within Ring 0:… |
n/a |
TDX Module |
2026-02-10T16:25:34.696Z | 2026-02-11T04:56:24.566Z |
| CVE-2025-30508 |
6.5 (3.1)
|
Improper authorization in the Intel(R) Quick Assi… |
n/a |
Intel(R) Platforms |
2026-02-10T16:25:33.137Z | 2026-02-10T17:34:22.439Z |
| CVE-2025-29952 |
5.9 (4.0)
|
Improper Initialization within the AMD Secure Enc… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:09:37.854Z | 2026-02-10T21:06:53.932Z |
| CVE-2025-29951 |
7.3 (4.0)
|
A buffer overflow in the AMD Secure Processor (AS… |
AMD |
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics |
2026-02-10T19:50:51.594Z | 2026-02-11T04:56:49.007Z |
| CVE-2025-29950 |
7.1 (4.0)
|
Improper input validation in system management mo… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:10:28.112Z | 2026-02-11T04:56:51.402Z |
| CVE-2025-29949 |
4.8 (4.0)
|
Insufficient input parameter sanitization in AMD … |
AMD |
AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics |
2026-02-10T19:46:42.763Z | 2026-02-10T20:40:37.898Z |
| CVE-2025-29948 |
5.9 (4.0)
|
Improper access control in AMD Secure Encrypted V… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:07:53.130Z | 2026-02-11T15:08:46.377Z |
| CVE-2025-29946 |
4.5 (4.0)
|
Insufficient or Incomplete Data Removal in Hardwa… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:15:57.179Z | 2026-02-10T21:42:14.335Z |
| CVE-2025-29939 |
6.9 (4.0)
|
Improper access control in secure encrypted virtu… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:11:59.059Z | 2026-02-10T20:59:47.124Z |
| CVE-2025-27940 |
4.1 (3.1)
|
Out-of-bounds read for some TDX Module before ver… |
n/a |
TDX Module |
2026-02-10T16:25:31.294Z | 2026-02-10T17:34:39.346Z |
| CVE-2025-27708 |
4.1 (3.1)
|
Out-of-bounds read in the firmware for some Intel… |
n/a |
Intel(R) Converged Security and Management Engine (CSME) Firmware (FW) |
2026-02-10T16:25:29.434Z | 2026-02-10T17:32:52.392Z |
| CVE-2025-27572 |
4.1 (3.1)
|
Exposure of sensitive information during transien… |
n/a |
TDX |
2026-02-10T16:25:27.673Z | 2026-02-10T17:33:10.536Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-36522 | Incorrect default permissions for some Intel(R) Chipset Software before version 10.1.20266.8668 or … | 2026-02-10T17:16:18.393 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-36511 | Incorrect default permissions for some Intel(R) Memory and Storage Tool before version 2.5.2 within… | 2026-02-10T17:16:18.230 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-35999 | Incorrect permission assignment for critical resource for some System Firmware Update Utility (SysF… | 2026-02-10T17:16:18.057 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-35998 | Missing protection mechanism for alternate hardware interface in the Intel(R) Quick Assist Technolo… | 2026-02-10T17:16:17.880 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-35992 | Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 1: Device Driv… | 2026-02-10T17:16:17.703 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-33030 | Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 3: User Applic… | 2026-02-10T17:16:17.537 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32739 | Improper conditions check in some firmware for some Intel(R) Graphics Drivers and Intel LTS kernels… | 2026-02-10T17:16:17.360 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32735 | Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 1: Device Driv… | 2026-02-10T17:16:17.200 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32467 | Use of uninitialized variable for some TDX Module before version tdx1.5 within Ring 0: Hypervisor m… | 2026-02-10T17:16:17.040 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32453 | Incorrect default permissions for some Intel(R) Graphics Driver software within Ring 2: Privileged … | 2026-02-10T17:16:16.877 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32452 | Uncontrolled search path for some AI Playground before version 2.6.1 beta within Ring 3: User Appli… | 2026-02-10T17:16:16.717 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32092 | Insecure inherited permissions for some Intel(R) Graphics Software before version 25.30.1702.0 with… | 2026-02-10T17:16:16.553 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32008 | Out-of-bounds write in the firmware for the Intel(R) AMT and Intel(R) Standard Manageability within… | 2026-02-10T17:16:16.393 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32007 | Out-of-bounds read for some TDX before version tdx module 1.5.24 within Ring 0: Hypervisor may allo… | 2026-02-10T17:16:16.233 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32003 | Out-of-bounds read in the firmware for some 100GbE Intel(R) Ethernet Network Adapter E810 before ve… | 2026-02-10T17:16:16.073 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31944 | Race condition for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow a deni… | 2026-02-10T17:16:15.890 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31655 | Incorrect default permissions for some Intel(R) Battery Life Diagnostic Tool within Ring 3: User Ap… | 2026-02-10T17:16:15.723 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31648 | Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an e… | 2026-02-10T17:16:15.550 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-30513 | Race condition for some TDX Module within Ring 0: Hypervisor may allow an escalation of privilege. … | 2026-02-10T17:16:15.390 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-30508 | Improper authorization in the Intel(R) Quick Assist Technology for some Intel(R) Platforms within R… | 2026-02-10T17:16:15.233 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29952 | Improper Initialization within the AMD Secure Encrypted Virtualization (SEV) firmware can allow an … | 2026-02-10T20:16:44.767 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29951 | A buffer overflow in the AMD Secure Processor (ASP) bootloader could allow an attacker to overwrite… | 2026-02-10T20:16:44.630 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29950 | Improper input validation in system management mode (SMM) could allow a privileged attacker to over… | 2026-02-10T20:16:44.493 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29949 | Insufficient input parameter sanitization in AMD Secure Processor (ASP) Boot Loader (legacy recover… | 2026-02-10T20:16:44.337 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29948 | Improper access control in AMD Secure Encrypted Virtualization (SEV) firmware could allow a malicio… | 2026-02-10T20:16:44.197 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29946 | Insufficient or Incomplete Data Removal in Hardware Component in SEV firmware doesn't fully flush I… | 2026-02-10T20:16:44.057 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29939 | Improper access control in secure encrypted virtualization (SEV) could allow a privileged attacker … | 2026-02-10T20:16:43.910 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27940 | Out-of-bounds read for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow an… | 2026-02-10T17:16:15.063 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27708 | Out-of-bounds read in the firmware for some Intel(R) Converged Security and Management Engine (CSME… | 2026-02-10T17:16:14.900 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27572 | Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor… | 2026-02-10T17:16:14.763 | 2026-02-10T21:51:48.077 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3r4v-9hh7-vrpx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: core: Do n… | 2025-10-04T18:31:16Z | 2026-02-05T18:30:28Z |
| ghsa-397q-f49x-2c9j |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Validate data run of… | 2025-10-04T18:31:14Z | 2026-02-05T18:30:28Z |
| ghsa-354h-9xfq-qm7v |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix pci device refc… | 2025-10-04T18:31:14Z | 2026-02-05T18:30:28Z |
| ghsa-2p73-743m-m4r5 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drbd: only clone bio if we hav… | 2025-10-04T18:31:14Z | 2026-02-05T18:30:28Z |
| ghsa-5f7q-jpqc-wp7h |
5.9 (3.1)
|
Next.js has Unbounded Memory Consumption via PPR Resume Endpoint | 2026-01-28T15:20:55Z | 2026-02-05T17:17:16Z |
| ghsa-6c59-mwgh-r2x6 |
6.6 (4.0)
|
JSONPath vulnerable to Prototype Pollution due to insufficient input validation of object keys in l… | 2026-01-28T18:30:47Z | 2026-02-05T16:14:30Z |
| ghsa-7gcm-g887-7qv7 |
8.2 (4.0)
|
protobuf affected by a JSON recursion depth bypass | 2026-01-23T15:31:35Z | 2026-02-05T15:47:43Z |
| ghsa-7p63-w6x9-6gr7 |
9.4 (4.0)
|
Eclipse Jersey has a Race Condition | 2025-11-18T18:32:51Z | 2026-02-05T15:43:36Z |
| ghsa-mw8w-q3f7-2v85 |
6.1 (3.1)
2.1 (4.0)
|
Podinfo affected by Arbitrary File Upload that leads to Stored Cross-Site Scripting (XSS) | 2026-02-03T18:30:47Z | 2026-02-05T15:41:47Z |
| ghsa-xqqc-9hrc-5xh7 |
8.6 (3.1)
|
IBM Aspera Console 3.4.0 through 3.4.8 is vulnerable to SQL injection. A remote attacker could send… | 2026-02-05T15:31:14Z | 2026-02-05T15:31:14Z |
| ghsa-vfmp-7mg9-25v9 |
6.3 (3.1)
|
Infinera DNA is vulnerable to a time-based SQL injection vulnerability due to insufficient input va… | 2026-02-05T09:31:12Z | 2026-02-05T15:31:14Z |
| ghsa-qmmq-r82h-32qv |
4.3 (3.1)
|
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to unauthoriz… | 2026-02-05T15:31:14Z | 2026-02-05T15:31:14Z |
| ghsa-p3p7-9h4w-jqw2 |
3.8 (3.1)
|
It was possible to improperly access the parent directory of an os.Root by opening a filename endin… | 2026-02-05T00:31:01Z | 2026-02-05T15:31:14Z |
| ghsa-jc8f-h9g4-2cf5 |
7.5 (3.1)
|
Water-Melon Melon commit 9df9292 and below is vulnerable to Denial of Service. The HTTP component d… | 2026-02-04T21:30:32Z | 2026-02-05T15:31:14Z |
| ghsa-j42q-g27m-825x |
8.7 (4.0)
|
Path Traversal vulnerability in Digitek ADT1100 and Digitek DT950 from PRIMION DIGITEK, S.L.U (Azko… | 2026-02-05T15:31:14Z | 2026-02-05T15:31:14Z |
| ghsa-f4xv-648j-g6xj |
5.1 (3.1)
|
IBM App Connect Enterprise Certified Container up to 12.19.0 (Continuous Delivery) and 12.0 LTS (Lo… | 2026-02-05T15:31:14Z | 2026-02-05T15:31:14Z |
| ghsa-ch6m-4rg5-6h78 |
6.5 (3.1)
|
IBM webMethods Integration (on prem) - Integration Server 10.15 through IS_10.15_Core_Fix2411.1 to … | 2026-02-05T15:31:14Z | 2026-02-05T15:31:14Z |
| ghsa-8jvr-vh7g-f8gx |
8.6 (3.1)
|
A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the res… | 2026-02-05T06:31:23Z | 2026-02-05T15:31:14Z |
| ghsa-xhfr-4q2x-5mx4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_fq: fix integer… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:09Z |
| ghsa-wv35-4hfx-h763 |
9.8 (3.1)
|
A buffer overflow vulnerability exists in TOTOLINK A950RG V4.1.2cu.5204_B20210112. The issue reside… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-mx3r-64m3-f78g |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gvt: fix vgpu debugfs… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:09Z |
| ghsa-m43v-grhw-r4h4 |
7.5 (3.1)
|
The ORICO NAS CD3510 (version V1.9.12 and below) contains an Incorrect Symlink Follow vulnerability… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-m2rq-533f-3phc |
6.1 (3.1)
|
NetBox is an open-source infrastructure resource modeling and IP address management platform. A ref… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-hg9w-23hg-6pfv |
9.8 (3.1)
|
The ZSPACE Q2C NAS contains a vulnerability related to incorrect symbolic link following. Attackers… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-h734-xmpp-h957 |
5.4 (3.1)
|
Missing Authorization vulnerability in Element Invader ElementInvader Addons for Elementor elementi… | 2026-02-03T15:30:27Z | 2026-02-05T15:31:09Z |
| ghsa-frpp-8pwq-hjrx |
4.3 (3.1)
|
Hibernate Reactive Vulnerable to DoS via Connection Pool Exhaustion | 2026-01-26T21:30:36Z | 2026-02-05T15:31:09Z |
| ghsa-2cqf-mg5g-39xv |
9.8 (3.1)
|
An Incorrect Symlink Follow vulnerability exists in multiple Yottamaster NAS devices, including DM2… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-27qh-whg4-7h58 |
9.8 (3.1)
|
A buffer overflow vulnerability exists in the setParentalRules interface of TOTOLINK A950RG V4.1.2c… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-rf5c-crcv-v9wg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: tipc: fix an information leak … | 2025-10-07T18:31:08Z | 2026-02-05T15:31:08Z |
| ghsa-qhmw-vr57-jm8g |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: memcontrol: ensure memcg acqui… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32034 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.977295Z |
| gsd-2024-32033 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.975354Z |
| gsd-2024-32032 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.982998Z |
| gsd-2024-32031 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.987315Z |
| gsd-2024-32030 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.998617Z |
| gsd-2024-32029 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.976755Z |
| gsd-2024-32028 | OpenTelemetry dotnet is a dotnet telemetry framework. In affected versions of `OpenTeleme… | 2024-04-11T05:03:18.984373Z |
| gsd-2024-32026 | Kohya_ss is a GUI for Kohya's Stable Diffusion trainers. Kohya_ss is vulnerable to a comm… | 2024-04-11T05:03:18.976480Z |
| gsd-2024-32023 | Kohya_ss is a GUI for Kohya's Stable Diffusion trainers. Kohya_ss is vulnerable to a path… | 2024-04-11T05:03:18.977852Z |
| gsd-2024-32022 | Kohya_ss is a GUI for Kohya's Stable Diffusion trainers. Kohya_ss is vulnerable to comma… | 2024-04-11T05:03:18.993474Z |
| gsd-2024-32021 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.986771Z |
| gsd-2024-32020 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.974758Z |
| gsd-2024-32019 | Netdata is an open source observability tool. In affected versions the `ndsudo` tool ship… | 2024-04-11T05:03:18.999367Z |
| gsd-2024-32017 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.982726Z |
| gsd-2024-32016 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.995031Z |
| gsd-2024-32015 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.988148Z |
| gsd-2024-32014 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.992094Z |
| gsd-2024-32013 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.975927Z |
| gsd-2024-32011 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.997415Z |
| gsd-2024-32010 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.994748Z |
| gsd-2024-32009 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.985869Z |
| gsd-2024-32008 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.979573Z |
| gsd-2024-32007 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.980958Z |
| gsd-2024-32006 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.992644Z |
| gsd-2024-32005 | NiceGUI is an easy-to-use, Python-based UI framework. A local file inclusion is present i… | 2024-04-11T05:03:18.996143Z |
| gsd-2024-32003 | wn-dusk-plugin (Dusk plugin) is a plugin which integrates Laravel Dusk browser testing in… | 2024-04-11T05:03:18.994519Z |
| gsd-2024-32002 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:18.977025Z |
| gsd-2024-32001 | SpiceDB is a graph database purpose-built for storing and evaluating access control data.… | 2024-04-11T05:03:18.995411Z |
| gsd-2024-32000 | matrix-appservice-irc is a Node.js IRC bridge for the Matrix messaging protocol. matrix-a… | 2024-04-11T05:03:18.983545Z |
| gsd-2023-7255 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:02:05.549541Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-190969 | Malicious code in invo (npm) | 2025-11-24T22:00:24Z | 2025-12-23T22:40:24Z |
| MAL-2025-190962 | Malicious code in haufe-axera-api-client (npm) | 2025-11-24T21:56:18Z | 2025-12-23T22:40:24Z |
| MAL-2025-190491 | Malicious code in form-classifier (npm) | 2025-11-13T17:54:50Z | 2025-12-23T22:40:24Z |
| mal-2025-192200 | Malicious code in elf-stats-wintry-sled-578 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:40:23Z |
| mal-2025-192199 | Malicious code in elf-stats-wintry-satchel-723 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:40:23Z |
| MAL-2025-192200 | Malicious code in elf-stats-wintry-sled-578 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:40:23Z |
| MAL-2025-192199 | Malicious code in elf-stats-wintry-satchel-723 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:40:23Z |
| mal-2025-192628 | Malicious code in elf-stats-wintry-chimney-348 (npm) | 2025-12-19T08:44:11Z | 2025-12-23T22:09:11Z |
| mal-2025-192540 | Malicious code in elf-stats-twinkling-wishlist-283 (npm) | 2025-12-11T19:46:09Z | 2025-12-23T22:09:11Z |
| mal-2025-192534 | Malicious code in elf-stats-sugarplum-snowman-116 (npm) | 2025-12-11T19:46:09Z | 2025-12-23T22:09:11Z |
| mal-2025-192286 | Malicious code in elf-stats-tinsel-sparkler-289 (npm) | 2025-12-03T19:38:32Z | 2025-12-23T22:09:11Z |
| mal-2025-192285 | Malicious code in elf-stats-sugarplum-cookiejar-287 (npm) | 2025-12-03T19:42:46Z | 2025-12-23T22:09:11Z |
| mal-2025-192270 | Malicious code in elf-stats-tinsel-candy-605 (npm) | 2025-12-03T18:49:05Z | 2025-12-23T22:09:11Z |
| mal-2025-192243 | Malicious code in elf-stats-wintry-cocoa-831 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| mal-2025-192241 | Malicious code in elf-stats-velvet-snowman-470 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| mal-2025-192240 | Malicious code in elf-stats-velvet-ornament-148 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| mal-2025-192238 | Malicious code in elf-stats-sugarplum-muffin-944 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| mal-2025-192237 | Malicious code in elf-stats-storybook-snowglobe-157 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| mal-2025-192198 | Malicious code in elf-stats-wintry-ornament-960 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192196 | Malicious code in elf-stats-wintry-hollyberry-832 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192194 | Malicious code in elf-stats-wintry-fir-892 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192192 | Malicious code in elf-stats-whimsical-rocket-922 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192191 | Malicious code in elf-stats-whimsical-muffin-613 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192190 | Malicious code in elf-stats-whimsical-marshmallow-258 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192189 | Malicious code in elf-stats-whimsical-marshmallow-212 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192188 | Malicious code in elf-stats-whimsical-ledger-767 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192187 | Malicious code in elf-stats-whimsical-lantern-823 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192181 | Malicious code in elf-stats-twinkling-marshmallow-913 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192178 | Malicious code in elf-stats-tinsel-pantry-856 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192173 | Malicious code in elf-stats-sugarplum-star-404 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0826 | Dell BIOS: Schwachstelle ermöglicht Denial of Service | 2024-04-09T22:00:00.000+00:00 | 2024-11-28T23:00:00.000+00:00 |
| wid-sec-w-2024-0825 | Fortinet FortiClient: Schwachstelle ermöglicht Codeausführung | 2024-04-09T22:00:00.000+00:00 | 2024-11-28T23:00:00.000+00:00 |
| wid-sec-w-2024-0824 | Fortinet FortiClient: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-04-09T22:00:00.000+00:00 | 2024-11-28T23:00:00.000+00:00 |
| wid-sec-w-2024-0823 | Fortinet FortiManager: Schwachstelle ermöglicht Codeausführung | 2024-04-09T22:00:00.000+00:00 | 2024-11-28T23:00:00.000+00:00 |
| wid-sec-w-2024-0822 | Adobe Photoshop: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-04-09T22:00:00.000+00:00 | 2024-11-28T23:00:00.000+00:00 |
| wid-sec-w-2024-3561 | Drupal: Schwachstelle ermöglicht Manipulation und Offenlegung von Daten | 2024-11-27T23:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-1494 | Splunk Enterprise: Mehrere Schwachstellen | 2024-07-01T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-1158 | Google Chrome: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-05-15T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-1009 | FRRouting Project FRRouting: Schwachstelle ermöglicht Denial of Service | 2024-05-01T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0820 | Adobe Magento: Mehrere Schwachstellen | 2024-04-09T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0817 | Siemens SIMATIC WinCC: Schwachstelle ermöglicht Denial of Service | 2024-04-08T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0816 | Checkmk: Schwachstelle ermöglicht Manipulation von Dateien | 2024-04-08T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0810 | HCL BigFix: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-04-08T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0808 | WordPress: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-04-07T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0807 | IBM Personal Communications: Schwachstelle ermöglicht Privilegienerweiterung und Codeausführung mit den Rechten des Systems | 2024-04-07T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0806 | FRRouting Project FRRouting: Schwachstellen ermöglichen Denial of Service | 2024-04-07T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0802 | Apache CloudStack: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-04-04T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0800 | ESRI Portal for ArcGIS: Mehrere Schwachstellen | 2024-04-04T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0799 | Apache Kafka: Schwachstelle ermöglicht Denial of Service | 2024-04-04T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0796 | Dell NetWorker: Schwachstelle ermöglicht Denial of Service | 2024-04-04T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0794 | Dell ECS: Mehrere Schwachstellen | 2024-04-04T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0793 | Microsoft Edge: Mehrere Schwachstellen ermöglichen Darstellen falscher Informationen | 2024-04-04T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0792 | Yubico YubiKey: Schwachstelle ermöglicht Privilegieneskalation | 2024-04-04T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0791 | Hashicorp Vault: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-04-04T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0790 | ffmpeg: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-04-04T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0786 | Mozilla Firefox für iOS: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2024-04-03T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0785 | Cisco Emergency Responder: Mehrere Schwachstellen | 2024-04-03T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0782 | Cisco Unified Communications Manager IM & Presence Service: Schwachstelle ermöglicht Cross-Site Scripting | 2024-04-03T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0779 | Cisco Identity Services Engine (ISE): Mehrere Schwachstellen | 2024-04-03T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0777 | Cisco Nexus Dashboard: Mehrere Schwachstellen | 2024-04-03T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:0725 | Red Hat Security Advisory: kernel-rt security update | 2024-02-07T16:21:36+00:00 | 2026-02-18T19:21:00+00:00 |
| rhsa-2024:0723 | Red Hat Security Advisory: kernel security update | 2024-02-07T16:32:17+00:00 | 2026-02-18T19:21:00+00:00 |
| rhsa-2024:0376 | Red Hat Security Advisory: kpatch-patch security update | 2024-01-23T17:25:17+00:00 | 2026-02-18T19:20:58+00:00 |
| rhsa-2024:1248 | Red Hat Security Advisory: kernel security update | 2024-03-12T00:51:07+00:00 | 2026-02-18T19:20:57+00:00 |
| rhsa-2024:0340 | Red Hat Security Advisory: kpatch-patch security update | 2024-01-23T09:16:28+00:00 | 2026-02-18T19:20:54+00:00 |
| rhsa-2024:0371 | Red Hat Security Advisory: kpatch-patch security update | 2024-01-23T17:30:13+00:00 | 2026-02-18T19:20:53+00:00 |
| rhsa-2024:0089 | Red Hat Security Advisory: kpatch-patch security update | 2024-01-09T09:17:50+00:00 | 2026-02-18T19:20:51+00:00 |
| rhsa-2024:0403 | Red Hat Security Advisory: kernel security update | 2024-01-25T11:15:32+00:00 | 2026-02-18T19:20:50+00:00 |
| rhsa-2024:0402 | Red Hat Security Advisory: kernel-rt security update | 2024-01-25T11:14:30+00:00 | 2026-02-18T19:20:50+00:00 |
| rhsa-2024:0461 | Red Hat Security Advisory: kernel security update | 2024-01-25T11:04:05+00:00 | 2026-02-18T19:20:49+00:00 |
| rhsa-2024:0347 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2024-01-23T16:26:16+00:00 | 2026-02-18T19:20:49+00:00 |
| rhsa-2024:0346 | Red Hat Security Advisory: kernel security and bug fix update | 2024-01-23T16:30:16+00:00 | 2026-02-18T19:20:48+00:00 |
| rhsa-2024:0113 | Red Hat Security Advisory: kernel security update | 2024-01-10T10:50:39+00:00 | 2026-02-18T19:20:47+00:00 |
| rhsa-2024:0134 | Red Hat Security Advisory: kernel-rt security update | 2024-01-10T10:50:40+00:00 | 2026-02-18T19:20:46+00:00 |
| rhsa-2023:7558 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-28T18:53:27+00:00 | 2026-02-18T19:20:44+00:00 |
| rhsa-2023:7559 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-28T19:07:02+00:00 | 2026-02-18T19:20:43+00:00 |
| rhsa-2023:7554 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-28T17:57:56+00:00 | 2026-02-18T19:20:41+00:00 |
| rhsa-2023:7410 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-21T11:47:34+00:00 | 2026-02-18T19:20:41+00:00 |
| rhsa-2023:7418 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-21T14:51:59+00:00 | 2026-02-18T19:20:40+00:00 |
| rhsa-2023:7419 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-21T15:31:09+00:00 | 2026-02-18T19:20:39+00:00 |
| rhsa-2023:7417 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-21T14:47:07+00:00 | 2026-02-18T19:20:39+00:00 |
| rhsa-2023:7411 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-21T12:28:04+00:00 | 2026-02-18T19:20:39+00:00 |
| rhsa-2023:7434 | Red Hat Security Advisory: kernel security and bug fix update | 2023-11-21T15:36:34+00:00 | 2026-02-18T19:20:38+00:00 |
| rhsa-2023:7431 | Red Hat Security Advisory: kernel-rt security update | 2023-11-21T15:30:04+00:00 | 2026-02-18T19:20:37+00:00 |
| rhsa-2023:7548 | Red Hat Security Advisory: kernel-rt security update | 2023-11-28T16:05:26+00:00 | 2026-02-18T19:20:36+00:00 |
| rhsa-2023:7398 | Red Hat Security Advisory: kernel security and bug fix update | 2023-11-21T11:50:08+00:00 | 2026-02-18T19:20:35+00:00 |
| rhsa-2023:6799 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-08T08:43:29+00:00 | 2026-02-18T19:20:35+00:00 |
| rhsa-2023:7549 | Red Hat Security Advisory: kernel security and bug fix update | 2023-11-28T16:09:31+00:00 | 2026-02-18T19:20:34+00:00 |
| rhsa-2023:7389 | Red Hat Security Advisory: kernel-rt security update | 2023-11-21T11:14:43+00:00 | 2026-02-18T19:20:32+00:00 |
| rhsa-2023:7382 | Red Hat Security Advisory: kernel security and bug fix update | 2023-11-21T11:20:38+00:00 | 2026-02-18T19:20:32+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-222-04 | Fuji Electric Monitouch V-SFT | 2017-08-10T00:00:00.000000Z | 2017-08-10T00:00:00.000000Z |
| icsa-17-222-03 | Solar Controls WATTConfig M Software | 2017-08-10T00:00:00.000000Z | 2017-08-10T00:00:00.000000Z |
| icsa-17-222-02 | Solar Controls Heating Control Downloader (HCDownloader) | 2017-08-10T00:00:00.000000Z | 2017-08-10T00:00:00.000000Z |
| icsa-17-222-01 | SIMPlight SCADA Software | 2017-08-10T00:00:00.000000Z | 2017-08-10T00:00:00.000000Z |
| icsa-17-220-02 | Moxa SoftNVR-IA Live Viewer | 2017-08-08T00:00:00.000000Z | 2017-08-08T00:00:00.000000Z |
| icsa-17-220-01 | OSIsoft PI Integrator | 2017-08-08T00:00:00.000000Z | 2017-08-08T00:00:00.000000Z |
| icsma-17-215-02 | ICSMA-17-215-02_Siemens Molecular Imaging Vulnerabilities | 2017-08-03T00:00:00.000000Z | 2017-08-03T00:00:00.000000Z |
| icsma-17-215-01 | ICSMA-17-215-01_Siemens Molecular Imaging Vulnerabilities | 2017-08-03T00:00:00.000000Z | 2017-08-03T00:00:00.000000Z |
| icsa-17-215-01 | Schneider Electric Pro-face GP-Pro EX | 2017-08-03T00:00:00.000000Z | 2017-08-03T00:00:00.000000Z |
| icsa-17-213-01 | Mitsubishi Electric Europe B.V. E-Designer | 2017-08-01T00:00:00.000000Z | 2017-08-01T00:00:00.000000Z |
| icsa-17-208-03 | PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch | 2017-07-27T00:00:00.000000Z | 2017-07-27T00:00:00.000000Z |
| icsa-17-208-02 | Mirion Technologies Telemetry Enabled Devices | 2017-07-27T00:00:00.000000Z | 2017-07-27T00:00:00.000000Z |
| icsa-17-208-01 | Continental AG Infineon S-Gold 2 (PMB 8876) | 2017-07-27T00:00:00.000000Z | 2017-07-27T00:00:00.000000Z |
| icsa-17-152-02 | NXP i.MX Product Family | 2017-06-01T00:00:00.000000Z | 2017-07-25T00:00:00.000000Z |
| icsa-17-117-01b | GE Multilin SR, UR, and URplus Protective Relays (Update B) | 2017-04-27T00:00:00.000000Z | 2017-07-25T00:00:00.000000Z |
| icsa-17-201-01 | Schneider Electric PowerSCADA Anywhere and Citect Anywhere | 2017-07-20T00:00:00.000000Z | 2017-07-20T00:00:00.000000Z |
| icsa-17-103-02a | Schneider Electric Modicon M221 PLCs and SoMachine Basic (Update A) | 2017-04-13T00:00:00.000000Z | 2017-07-20T00:00:00.000000Z |
| icsa-17-138-03 | Rockwell Automation MicroLogix 1100 Controllers | 2017-05-18T00:00:00.000000Z | 2017-07-18T00:00:00.000000Z |
| icsa-17-194-03 | Siemens SIMATIC Sm@rtClient Android App | 2017-07-13T00:00:00.000000Z | 2017-07-13T00:00:00.000000Z |
| icsa-17-194-01 | Siemens SiPass integrated | 2017-07-13T00:00:00.000000Z | 2017-07-13T00:00:00.000000Z |
| icsa-17-192-06 | Schweitzer Engineering Laboratories, Inc. SEL-3620 and SEL-3622 | 2017-07-11T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-192-04 | OSIsoft PI Coresight | 2017-07-11T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-192-03 | ABB VSN300 WiFi Logger Card | 2017-07-11T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-192-02 | Fuji Electric V-Server | 2017-07-11T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-192-01 | Siemens SIMATIC Logon | 2017-07-11T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-180-01a | ICSA-17-180-01A_Siemens SIMATIC Industrial PCs, SINUMERIK Panel Control Unit, and SIMOTION P320 (Update A) | 2017-06-29T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-010-01a | OSIsoft PI Coresight and PI Web API (Update A) | 2017-01-10T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-187-05 | Schneider Electric Ampla MES | 2017-07-06T00:00:00.000000Z | 2017-07-06T00:00:00.000000Z |
| icsa-17-187-04 | Schneider Electric Wonderware ArchestrA Logger | 2017-07-06T00:00:00.000000Z | 2017-07-06T00:00:00.000000Z |
| icsa-17-187-02 | Siemens Reyrolle | 2017-07-06T00:00:00.000000Z | 2017-07-06T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20190327-isdn | Cisco IOS and IOS XE Software ISDN Interface Denial of Service Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-ipsla-dos | Cisco IOS and IOS XE Software IP Service Level Agreement Denial of Service Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-iosxe-privesc | Cisco IOS XE Software Privilege Escalation Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-iosxe-pe | Cisco IOS XE Software Privilege Escalation Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-iosxe-cmdinject | Cisco IOS XE Software Command Injection Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-iosxe-cmdinj | Cisco IOS XE Software Command Injection Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-info | Cisco IOS and IOS XE Software Information Disclosure Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-evss | Cisco IOS XE Software Catalyst 4500 Cisco Discovery Protocol Denial of Service Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-eta-dos | Cisco IOS XE Software Encrypted Traffic Analytics Denial of Service Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-cmp-dos | Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-call-home-cert | Cisco IOS and IOS XE Software Smart Call Home Certificate Validation Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-c6500 | Cisco IOS Software Catalyst 6500 Series 802.1x Authentication Bypass Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190327-afu | Cisco IOS XE Software Arbitrary File Upload Vulnerability | 2019-03-27T16:00:00+00:00 | 2019-03-27T16:00:00+00:00 |
| cisco-sa-20190109-ise-passwd | Cisco Identity Services Engine Password Recovery Vulnerability | 2019-01-09T16:00:00+00:00 | 2019-03-22T19:43:00+00:00 |
| cisco-sa-20190320-ipptv | Cisco IP Phone 8800 Series Path Traversal Vulnerability | 2019-03-20T16:00:00+00:00 | 2019-03-22T19:30:00+00:00 |
| cisco-sa-20190320-ipfudos | Cisco IP Phone 8800 Series File Upload Denial of Service Vulnerability | 2019-03-20T16:00:00+00:00 | 2019-03-22T19:30:00+00:00 |
| cisco-sa-20190320-ipab | Cisco IP Phone 8800 Series Authorization Bypass Vulnerability | 2019-03-20T16:00:00+00:00 | 2019-03-22T19:30:00+00:00 |
| cisco-sa-20190320-ip-phone-csrf | Cisco IP Phone 8800 Series Cross-Site Request Forgery Vulnerability | 2019-03-20T16:00:00+00:00 | 2019-03-22T19:30:00+00:00 |
| cisco-sa-20190320-ip-phone-rce | Cisco IP Phone 7800 Series and 8800 Series Remote Code Execution Vulnerability | 2019-03-20T16:00:00+00:00 | 2019-03-20T16:00:00+00:00 |
| cisco-sa-20190306-aci-shell-escape | Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Shell Escape Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-19T21:08:00+00:00 |
| cisco-sa-20190306-nxos-file-access | Cisco NX-OS Software Unauthorized Filesystem Access Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-19T20:55:00+00:00 |
| cisco-sa-20190306-nxos-fabric-dos | Cisco NX-OS Software Cisco Fabric Services Denial of Service Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-19T20:55:00+00:00 |
| cisco-sa-20190306-nxos-cmdinj-1613 | Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1613) | 2019-03-06T16:00:00+00:00 | 2019-03-19T20:55:00+00:00 |
| cisco-sa-20190215-runc | Container Privilege Escalation Vulnerability Affecting Cisco Products: February 2019 | 2019-02-15T17:00:00+00:00 | 2019-03-15T19:59:00+00:00 |
| cisco-sa-20190313-sip | Cisco Small Business SPA514G IP Phones SIP Denial of Service Vulnerability | 2019-03-13T16:00:00+00:00 | 2019-03-13T16:00:00+00:00 |
| cisco-sa-20190313-cspcscv | Cisco Common Services Platform Collector Static Credential Vulnerability | 2019-03-13T16:00:00+00:00 | 2019-03-13T16:00:00+00:00 |
| cisco-sa-20190109-esa-url-dos | Cisco Email Security Appliance URL Filtering Denial of Service Vulnerability | 2019-01-09T16:00:00+00:00 | 2019-03-13T14:25:00+00:00 |
| cisco-sa-20190306-apic-ipv6 | Cisco Application Policy Infrastructure Controller IPv6 Link-Local Address Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-12T19:05:00+00:00 |
| cisco-sa-20190220-cdp-lldp-dos | Cisco IP Phone 7800 and 8800 Series Cisco Discovery Protocol and Link Layer Discovery Protocol Denial of Service Vulnerability | 2019-02-20T16:00:00+00:00 | 2019-03-09T00:28:00+00:00 |
| cisco-sa-20190306-tetra-ace | Cisco Nexus 9000 Series Switches Standalone NX-OS Mode Tetration Analytics Agent Arbitrary Code Execution Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38583 | clk: xilinx: vcu: unregister pll_post only if registered correctly | 2025-08-02T00:00:00.000Z | 2026-01-10T01:03:53.000Z |
| msrc_cve-2025-38574 | pptp: ensure minimal skb length in pptp_xmit() | 2025-08-02T00:00:00.000Z | 2026-01-10T01:03:24.000Z |
| msrc_cve-2025-38572 | ipv6: reject malicious packets in ipv6_gso_segment() | 2025-08-02T00:00:00.000Z | 2026-01-10T01:03:19.000Z |
| msrc_cve-2025-38729 | ALSA: usb-audio: Validate UAC3 power domain descriptors, too | 2025-09-02T00:00:00.000Z | 2026-01-10T01:03:07.000Z |
| msrc_cve-2025-38728 | smb3: fix for slab out of bounds on mount to ksmbd | 2025-09-02T00:00:00.000Z | 2026-01-10T01:03:01.000Z |
| msrc_cve-2025-38725 | net: usb: asix_devices: add phy_mask for ax88772 mdio bus | 2025-09-02T00:00:00.000Z | 2026-01-10T01:02:56.000Z |
| msrc_cve-2025-38724 | nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() | 2025-09-02T00:00:00.000Z | 2026-01-10T01:02:51.000Z |
| msrc_cve-2025-38685 | fbdev: Fix vmalloc out-of-bounds write in fast_imageblit | 2025-09-02T00:00:00.000Z | 2026-01-10T01:02:46.000Z |
| msrc_cve-2025-38683 | hv_netvsc: Fix panic during namespace deletion with VF | 2025-09-02T00:00:00.000Z | 2026-01-10T01:02:37.000Z |
| msrc_cve-2025-38680 | media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() | 2025-09-02T00:00:00.000Z | 2026-01-10T01:02:26.000Z |
| msrc_cve-2025-38679 | media: venus: Fix OOB read due to missing payload bound check | 2025-09-02T00:00:00.000Z | 2026-01-10T01:02:21.000Z |
| msrc_cve-2025-38676 | iommu/amd: Avoid stack buffer overflow from kernel cmdline | 2025-08-02T00:00:00.000Z | 2026-01-10T01:02:11.000Z |
| msrc_cve-2025-38671 | i2c: qup: jump out of the loop in case of timeout | 2025-08-02T00:00:00.000Z | 2026-01-10T01:02:06.000Z |
| msrc_cve-2025-38668 | regulator: core: fix NULL dereference on unbind due to stale coupling data | 2025-08-02T00:00:00.000Z | 2026-01-10T01:02:01.000Z |
| msrc_cve-2025-38569 | benet: fix BUG when creating VFs | 2025-08-02T00:00:00.000Z | 2026-01-10T01:01:56.000Z |
| msrc_cve-2025-38565 | perf/core: Exit early on perf_mmap() fail | 2025-08-02T00:00:00.000Z | 2026-01-10T01:01:51.000Z |
| msrc_cve-2025-38563 | perf/core: Prevent VMA split of buffer mappings | 2025-08-02T00:00:00.000Z | 2026-01-10T01:01:45.000Z |
| msrc_cve-2025-38553 | net/sched: Restrict conditions for adding duplicating netems to qdisc tree | 2025-08-02T00:00:00.000Z | 2026-01-10T01:01:31.000Z |
| msrc_cve-2025-39706 | drm/amdkfd: Destroy KFD debugfs after destroy KFD wq | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:21.000Z |
| msrc_cve-2025-39703 | net, hsr: reject HSR frame if skb can't hold tag | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:16.000Z |
| msrc_cve-2025-39702 | ipv6: sr: Fix MAC comparison to be constant-time | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:11.000Z |
| msrc_cve-2025-39697 | NFS: Fix a race when updating an existing write | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:06.000Z |
| msrc_cve-2025-39691 | fs/buffer: fix use-after-free when call bh_read() helper | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:56.000Z |
| msrc_cve-2025-39689 | ftrace: Also allocate and copy hash for reading of filter files | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:51.000Z |
| msrc_cve-2025-39683 | tracing: Limit access to parser->buffer when trace_get_user failed | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:31.000Z |
| msrc_cve-2025-39681 | x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:27.000Z |
| msrc_cve-2026-22185 | OpenLDAP <= 2.6.10 LMDB mdb_load Heap Buffer Underflow in readline() | 2026-01-02T00:00:00.000Z | 2026-01-09T01:08:20.000Z |
| msrc_cve-2025-39716 | parisc: Revise __get_user() to probe user read access | 2025-09-02T00:00:00.000Z | 2026-01-09T01:08:07.000Z |
| msrc_cve-2025-39693 | drm/amd/display: Avoid a NULL pointer dereference | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:51.000Z |
| msrc_cve-2025-39676 | scsi: qla4xxx: Prevent a potential error pointer dereference | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:43.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:12830-1 | ldb-tools-2.7.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12829-1 | nodejs-electron-22.3.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12828-1 | libruby3_2-3_2-3.2.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12827-1 | xorg-x11-server-21.1.7-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12826-1 | runc-1.1.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12825-1 | libopenssl-1_1-devel-1.1.1t-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12824-1 | libopenssl-1_0_0-devel-1.0.2u-14.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12823-1 | element-web-1.11.26-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12822-1 | containerd-1.6.19-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12821-1 | tomcat-9.0.43-15.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12820-1 | python310-oci-sdk-2.96.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12819-1 | stellarium-23.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12818-1 | nodejs-electron-22.3.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12817-1 | ffmpeg-6-6.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12816-1 | binutils-2.40-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12815-1 | liblouis-data-3.25.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12814-1 | kernel-devel-6.2.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12813-1 | dino-0.4.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12812-1 | curl-8.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12811-1 | chromedriver-111.0.5563.110-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12810-1 | kubernetes1.25-apiserver-1.25.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12809-1 | docker-compose-2.17.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12808-1 | amanda-3.5.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12807-1 | wasm-pack-0.11.0~0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12806-1 | ucode-intel-20230214-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12805-1 | ruby3.1-rubygem-rack-3.0.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12804-1 | ruby3.1-rubygem-activesupport-7.0-7.0.4.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12803-1 | cockpit-d-installer-0.8.1~1-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12802-1 | cmark-0.30.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12801-1 | libQt5Bootstrap-devel-static-32bit-5.15.8+kde183-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-1346 | UNKNOWN WRITE in StatsIncr | 2020-07-22T21:50:08.261306Z | 2022-04-13T03:04:32.737543Z |
| osv-2020-134 | Heap-buffer-overflow in pixFewColorsOctcubeQuantMixed | 2020-06-24T01:51:15.653519Z | 2022-04-13T03:04:32.681886Z |
| osv-2020-1321 | UNKNOWN READ in FlowGetHash | 2020-07-22T21:50:06.291563Z | 2022-04-13T03:04:32.748792Z |
| osv-2020-131 | Heap-buffer-overflow in pixGetRGBComponentCmap | 2020-06-24T01:51:15.520013Z | 2022-04-13T03:04:32.671359Z |
| osv-2020-1301 | Heap-buffer-overflow in hts_md5_update | 2020-07-22T21:50:04.440116Z | 2022-04-13T03:04:32.327879Z |
| osv-2020-1260 | Negative-size-param in heif::HeifPixelImage::fill_RGB_16bit | 2020-07-22T21:50:01.133969Z | 2022-04-13T03:04:32.430391Z |
| osv-2020-1253 | Heap-buffer-overflow in pixReadFromTiffStream | 2020-07-22T21:50:00.586423Z | 2022-04-13T03:04:32.644327Z |
| osv-2020-125 | Negative-size-param in parquet::PlainByteArrayDecoder::DecodeArrowDense | 2020-06-24T01:51:15.244409Z | 2022-04-13T03:04:32.019256Z |
| osv-2020-1246 | Stack-buffer-overflow in void apply_sao_internal<unsigned short> | 2020-07-22T21:50:00.006966Z | 2022-04-13T03:04:32.453257Z |
| osv-2020-124 | Dynamic-stack-buffer-overflow in RetrieveFPForSig | 2020-06-24T01:51:15.208520Z | 2022-04-13T03:04:32.754082Z |
| osv-2020-1226 | Heap-buffer-overflow in void mc_chroma<unsigned short> | 2020-07-22T21:49:58.234804Z | 2022-04-13T03:04:32.447601Z |
| osv-2020-1222 | UNKNOWN READ in hpeek | 2020-07-22T21:49:57.988557Z | 2022-04-13T03:04:32.274127Z |
| osv-2020-1192 | Index-out-of-bounds in decoder_context::has_sps | 2020-07-22T21:49:55.027546Z | 2022-04-13T03:04:32.436045Z |
| osv-2020-1178 | Global-buffer-overflow in arrow::Status arrow::VisitArrayInline<arrow::internal::ValidateArrayDataVisitor> | 2020-07-22T21:49:53.967051Z | 2022-04-13T03:04:32.040534Z |
| osv-2020-1176 | Use-of-uninitialized-value in put4bitbwtile | 2020-07-22T21:49:53.886180Z | 2022-04-13T03:04:32.628091Z |
| osv-2020-1170 | Heap-buffer-overflow in arrow::internal::CountSetBits | 2020-07-22T21:49:52.928701Z | 2022-04-13T03:04:32.014023Z |
| osv-2020-1167 | Heap-buffer-overflow in tiffReadCallback | 2020-07-22T21:49:52.626033Z | 2022-04-13T03:04:32.693612Z |
| osv-2020-1141 | Heap-buffer-overflow in ff_hevc_put_hevc_epel_pixels_8_sse | 2020-07-22T21:49:50.461909Z | 2022-04-13T03:04:32.413194Z |
| osv-2020-1138 | Heap-buffer-overflow in void apply_sao_internal<unsigned short> | 2020-07-22T21:49:50.071384Z | 2022-04-13T03:04:32.419159Z |
| osv-2020-1121 | UNKNOWN READ in vcf_format | 2020-07-22T21:49:48.717026Z | 2022-04-13T03:04:32.343836Z |
| osv-2020-110 | Heap-buffer-overflow in parquet::internal::RecordReader::Make | 2020-06-24T01:51:14.532580Z | 2022-04-13T03:04:32.083138Z |
| osv-2020-107 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2020-06-24T01:51:14.378012Z | 2022-04-13T03:04:32.825667Z |
| osv-2020-1047 | UNKNOWN READ in arrow::ipc::internal::FieldFromFlatbuffer | 2020-07-22T21:49:42.853693Z | 2022-04-13T03:04:32.008566Z |
| osv-2020-1026 | Heap-buffer-overflow in DefragInsertFrag | 2020-07-22T21:49:40.677143Z | 2022-04-13T03:04:32.763539Z |
| osv-2020-101 | UNKNOWN READ in apache::thrift::transport::TMemoryBuffer::readSlow | 2020-06-24T01:51:14.107760Z | 2022-04-13T03:04:32.046291Z |
| osv-2020-1007 | Heap-use-after-free in DetectParseDupSigCompareFunc | 2020-07-22T21:49:39.655879Z | 2022-04-13T03:04:32.743041Z |
| osv-2020-1 | Use-of-uninitialized-value in numaCrossingsByThreshold | 2020-06-24T01:51:08.502422Z | 2022-04-13T03:04:32.676718Z |
| osv-2018-91 | Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int | 2021-01-13T00:00:41.028574Z | 2022-04-13T03:04:32.936212Z |
| osv-2018-73 | Stack-buffer-overflow in hb_array_t<char const>::cmp | 2021-01-13T00:00:35.135604Z | 2022-04-13T03:04:32.941484Z |
| osv-2018-64 | Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int | 2021-01-13T00:00:31.625117Z | 2022-04-13T03:04:32.803589Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-moodle-2021-36402 | 2024-03-06T11:08:28.100Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-36401 | 2024-03-06T11:08:37.803Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-36400 | 2024-03-06T11:08:47.202Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-36399 | 2024-03-06T11:08:56.098Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-36398 | 2024-03-06T11:09:04.107Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-36397 | 2024-03-06T11:09:12.286Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-36396 | 2024-03-06T11:09:18.877Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-36395 | 2024-03-06T11:09:25.772Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-36394 | 2024-03-06T11:09:32.063Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-36393 | 2024-03-06T11:09:39.191Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-36392 | 2024-03-06T11:09:45.888Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-32478 | 2024-03-06T11:09:51.482Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-32477 | 2024-03-06T11:09:57.693Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-32476 | 2024-03-06T11:10:03.192Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-32475 | 2024-03-06T11:10:09.007Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-32474 | 2024-03-06T11:10:14.394Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-32473 | 2024-03-06T11:10:19.288Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-32472 | 2024-03-06T11:10:24.398Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-32244 | 2024-03-06T11:10:29.416Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-27131 | 2024-03-06T11:10:34.074Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-21809 | 2024-03-06T11:10:39.111Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-20283 | 2024-03-06T11:10:44.096Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-20282 | 2024-03-06T11:10:49.175Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-20281 | 2024-03-06T11:10:54.174Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-20280 | 2024-03-06T11:10:58.966Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-20279 | 2024-03-06T11:11:03.685Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-20187 | 2024-03-06T11:11:07.948Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-20186 | 2024-03-06T11:11:11.698Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-20185 | 2024-03-06T11:11:15.258Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-20184 | 2024-03-06T11:11:18.672Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Updated |
|---|---|---|
| var-202110-1412 | An out-of-bounds write was addressed with improved input validation. This issue is fixed … | 2024-02-13T01:16:23.219000Z |
| var-202107-0566 | An information disclosure vulnerability exists in the Syslog functionality of D-LINK DIR-… | 2024-02-13T01:16:20.561000Z |
| var-202203-0151 | This issue was addressed with improved checks. This issue is fixed in Security Update 202… | 2024-02-13T01:15:05.766000Z |
| var-202005-0719 | A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software ver… | 2024-02-13T01:09:52.259000Z |
| var-202206-1063 | A vulnerability has been identified in SCALANCE XM408-4C (All versions < V6.5), SCALANCE … | 2024-02-13T01:09:15.285000Z |
| var-202205-1331 | This issue was addressed with improved checks to prevent unauthorized actions. This issue… | 2024-02-13T01:08:34.187000Z |
| var-202104-0873 | Multiple memory corruption issues were addressed with improved input validation. This iss… | 2024-02-13T01:06:50.977000Z |
| var-202108-1294 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-02-13T01:03:03.867000Z |
| var-202107-0560 | This vulnerability is present in device_graph_page.php script, which is a part of the Adv… | 2024-02-13T01:01:56.962000Z |
| var-202006-1827 | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between seriali… | 2024-02-13T00:58:14.643000Z |
| var-202206-1079 | Incomplete cleanup in specific special register read operations for some Intel(R) Process… | 2024-02-13T00:55:06.069000Z |
| var-202112-0477 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visua… | 2024-02-13T00:53:33.673000Z |
| var-201503-0050 | The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP… | 2024-02-13T00:52:18.384000Z |
| var-202203-0146 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-02-13T00:44:25.347000Z |
| var-201202-0032 | Use-after-free vulnerability in Google Chrome before 17.0.963.46 allows remote attackers … | 2024-02-13T00:42:57.693000Z |
| var-202108-1941 | axios is vulnerable to Inefficient Regular Expression Complexity. axios Exists in a resou… | 2024-02-13T00:41:42.791000Z |
| var-202108-0483 | An OS Command Injection vulnerability exists in the ping.php script functionality of Adva… | 2024-02-13T00:40:55.922000Z |
| var-202009-1625 | In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.2… | 2024-02-13T00:37:15.052000Z |
| var-202004-0999 | In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were in… | 2024-02-13T00:36:39.718000Z |
| var-201909-0885 | In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use.… | 2024-02-13T00:34:13.322000Z |
| var-202107-0562 | This vulnerability is present in device_graph_page.php script, which is a part of the Adv… | 2024-02-13T00:32:29.453000Z |
| var-202108-2079 | This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6.… | 2024-02-13T00:31:49.215000Z |
| var-201904-1552 | The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel a… | 2024-02-13T00:27:12.341000Z |
| var-202006-1631 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in… | 2024-02-13T00:18:31.605000Z |
| var-202104-0647 | A race condition was addressed with improved locking. This issue is fixed in macOS Big Su… | 2024-02-13T00:17:56.345000Z |
| var-202205-0624 | .NET and Visual Studio Denial of Service Vulnerability. -----BEGIN PGP SIGNED MESSAGE----… | 2024-02-13T00:13:46.587000Z |
| var-202201-1926 | Rust is a multi-paradigm, general-purpose programming language designed for performance a… | 2024-02-13T00:08:50.989000Z |
| var-202006-1661 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is f… | 2024-02-13T00:04:32.714000Z |
| var-200804-0010 | Integer overflow in pdftops filter in CUPS in Red Hat Enterprise Linux 3 and 4, when runn… | 2024-02-13T00:03:08.554000Z |
| var-202108-1270 | A race condition was addressed with improved state handling. This issue is fixed in macOS… | 2024-02-13T00:01:02.474000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20054-1 | Security update for kubevirt | 2025-02-03T08:56:36Z | 2025-02-03T08:56:36Z |
| suse-su-2025:20053-1 | Security update for python-setuptools | 2025-02-03T08:56:29Z | 2025-02-03T08:56:29Z |
| suse-su-2025:20052-1 | Security update for gtk3 | 2025-02-03T08:56:11Z | 2025-02-03T08:56:11Z |
| suse-su-2025:20051-1 | Security update for krb5 | 2025-02-03T08:56:00Z | 2025-02-03T08:56:00Z |
| suse-su-2025:20050-1 | Security update for libarchive | 2025-02-03T08:55:48Z | 2025-02-03T08:55:48Z |
| suse-su-2025:20049-1 | Security update for git | 2025-02-03T08:55:36Z | 2025-02-03T08:55:36Z |
| suse-su-2025:20047-1 | Security update for the Linux Kernel | 2025-02-03T08:55:15Z | 2025-02-03T08:55:15Z |
| suse-su-2025:20046-1 | Security update for runc | 2025-02-03T08:55:05Z | 2025-02-03T08:55:05Z |
| suse-su-2025:20045-1 | Security update for expat | 2025-02-03T08:54:55Z | 2025-02-03T08:54:55Z |
| suse-su-2025:20044-1 | Security update for the Linux Kernel | 2025-02-03T08:54:39Z | 2025-02-03T08:54:39Z |
| suse-su-2025:20043-1 | Security update for libxml2 | 2025-02-03T08:54:28Z | 2025-02-03T08:54:28Z |
| suse-su-2025:20042-1 | Security update for selinux-policy | 2025-02-03T08:54:14Z | 2025-02-03T08:54:14Z |
| suse-su-2025:20041-1 | Security update for systemd | 2025-02-03T08:54:00Z | 2025-02-03T08:54:00Z |
| suse-su-2025:20039-1 | Security update for keepalived | 2025-02-03T08:53:35Z | 2025-02-03T08:53:35Z |
| suse-su-2025:20038-1 | Security update for glibc | 2025-02-03T08:53:19Z | 2025-02-03T08:53:19Z |
| suse-su-2025:20037-1 | Security update for python-urllib3 | 2025-02-03T08:53:11Z | 2025-02-03T08:53:11Z |
| suse-su-2025:20036-1 | Security update for qemu | 2025-02-03T08:53:00Z | 2025-02-03T08:53:00Z |
| suse-su-2025:20035-1 | Security update for python-Jinja2 | 2025-02-03T08:53:00Z | 2025-02-03T08:53:00Z |
| suse-su-2025:20034-1 | Security update for python-requests | 2025-02-03T08:52:32Z | 2025-02-03T08:52:32Z |
| suse-su-2025:20032-1 | Security update for avahi | 2025-02-03T08:52:02Z | 2025-02-03T08:52:02Z |
| suse-su-2025:20031-1 | Security update for glib2 | 2025-02-03T08:51:51Z | 2025-02-03T08:51:51Z |
| suse-su-2025:20030-1 | Security update for mozilla-nss | 2025-02-03T08:51:41Z | 2025-02-03T08:51:41Z |
| suse-su-2025:20029-1 | Security update for curl | 2025-02-03T08:51:25Z | 2025-02-03T08:51:25Z |
| suse-su-2025:20028-1 | Security update for the Linux Kernel | 2025-02-03T08:51:14Z | 2025-02-03T08:51:14Z |
| suse-su-2025:20025-1 | Security update for python311, python-rpm-macros | 2025-02-03T08:50:40Z | 2025-02-03T08:50:40Z |
| suse-su-2025:20024-1 | Security update for unbound | 2025-02-03T08:50:28Z | 2025-02-03T08:50:28Z |
| suse-su-2025:20022-1 | Security update for ca-certificates-mozilla | 2025-02-03T08:49:32Z | 2025-02-03T08:49:32Z |
| suse-su-2025:20020-1 | Security update for ucode-intel | 2025-02-03T08:49:06Z | 2025-02-03T08:49:06Z |
| suse-su-2025:20019-1 | Security update for skopeo | 2025-02-03T08:48:38Z | 2025-02-03T08:48:38Z |
| suse-su-2025:20018-1 | Security update for kernel-firmware | 2025-02-03T08:48:38Z | 2025-02-03T08:48:38Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-24068 | Huawei HarmonyOS Camera app权限验证绕过漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24067 | Huawei HarmonyOS device management模块缓冲区溢出漏洞漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24066 | Huawei HarmonyOS拒绝服务漏洞(CNVD-2025-24066) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24065 | Huawei HarmonyOS print模块异常处理不当漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24064 | Huawei HarmonyOS拒绝服务漏(CNVD-2025-24064)洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24063 | Huawei HarmonyOS print模块异常处理不当漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24062 | Huawei HarmonyOS camera模块权限控制漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24061 | Huawei HarmonyOS Gallery模块权限控制漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24060 | Huawei HarmonyOS Gallery app身份验证绕过漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24059 | Huawei HarmonyOS media模块权限控制漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24058 | Huawei HarmonyOS拒绝服务漏洞(CNVD-2025-24058) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24057 | Huawei HarmonyOS sensor service缓冲区溢出漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24056 | Huawei HarmonyOS development framework模块缓冲区溢出漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24055 | Huawei HarmonyOS network模块权限控制漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24054 | Huawei HarmonyOS office service内存错误引用漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24053 | Huawei HarmonyOS storage management模块内存错误引用漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24052 | Huawei HarmonyOS device management模块缓冲区溢出漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24051 | Huawei HarmonyOS package management模块数据处理错误漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24050 | Huawei HarmonyOS拒绝服务漏洞(CNVD-2025-24050) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24049 | Huawei HarmonyOS拒绝服务漏洞(CNVD-2025-24049) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24048 | Bold Workplanner不安全直接对象引用漏洞(CNVD-2025-24048) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24047 | Bold Workplanner不安全直接对象引用漏洞(CNVD-2025-24047) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24046 | Bold Workplanner不安全直接对象引用漏洞(CNVD-2025-24046) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24045 | Bold Workplanner不安全直接对象引用漏洞(CNVD-2025-24045) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24044 | Bold Workplanner不安全直接对象引用漏洞(CNVD-2025-24044) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24043 | Bold Workplanner不安全直接对象引用漏洞(CNVD-2025-24043) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24042 | Bold Workplanner不安全直接对象引用漏洞(CNVD-2025-24042) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24041 | Bold Workplanner不安全直接对象引用漏洞(CNVD-2025-24041) | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24040 | Bold Workplanner不安全直接对象引用漏洞 | 2025-10-15 | 2025-10-17 |
| cnvd-2025-24122 | Hostel Management System allocate_room.php文件SQL注入漏洞 | 2025-06-23 | 2025-10-16 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-0670 | Multiples vulnérabilités dans Splunk Machine Learning Toolkit | 2024-08-13T00:00:00.000000 | 2024-08-13T00:00:00.000000 |
| CERTFR-2024-AVI-0674 | Multiples vulnérabilités dans Zabbix | 2024-08-13T00:00:00.000000 | 2024-08-13T00:00:00.000000 |
| CERTFR-2024-AVI-0673 | Multiples vulnérabilités dans les produits Schneider Electric | 2024-08-13T00:00:00.000000 | 2024-08-13T00:00:00.000000 |
| CERTFR-2024-AVI-0671 | Multiples vulnérabilités dans les produits SAP | 2024-08-13T00:00:00.000000 | 2024-08-13T00:00:00.000000 |
| CERTFR-2024-AVI-0670 | Multiples vulnérabilités dans Splunk Machine Learning Toolkit | 2024-08-13T00:00:00.000000 | 2024-08-13T00:00:00.000000 |
| certfr-2024-avi-0669 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0668 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0667 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0666 | Multiples vulnérabilités dans les produits IBM | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0665 | Multiples vulnérabilités dans Microsoft Edge | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0664 | Vulnérabilité dans PostgreSQL | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0663 | Vulnérabilité dans Asterisk | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0662 | Vulnérabilité dans MongoDB | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| CERTFR-2024-AVI-0669 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| CERTFR-2024-AVI-0668 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| CERTFR-2024-AVI-0667 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| CERTFR-2024-AVI-0666 | Multiples vulnérabilités dans les produits IBM | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| CERTFR-2024-AVI-0665 | Multiples vulnérabilités dans Microsoft Edge | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| CERTFR-2024-AVI-0664 | Vulnérabilité dans PostgreSQL | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| CERTFR-2024-AVI-0663 | Vulnérabilité dans Asterisk | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| CERTFR-2024-AVI-0662 | Vulnérabilité dans MongoDB | 2024-08-09T00:00:00.000000 | 2024-08-09T00:00:00.000000 |
| certfr-2024-avi-0661 | Multiples vulnérabilités dans les produits Cisco | 2024-08-08T00:00:00.000000 | 2024-08-08T00:00:00.000000 |
| certfr-2024-avi-0660 | Multiples vulnérabilités dans Microsoft Windows | 2024-08-08T00:00:00.000000 | 2024-08-08T00:00:00.000000 |
| certfr-2024-avi-0659 | Multiples vulnérabilités dans GitLab | 2024-08-08T00:00:00.000000 | 2024-08-08T00:00:00.000000 |
| CERTFR-2024-AVI-0661 | Multiples vulnérabilités dans les produits Cisco | 2024-08-08T00:00:00.000000 | 2024-08-08T00:00:00.000000 |
| CERTFR-2024-AVI-0660 | Multiples vulnérabilités dans Microsoft Windows | 2024-08-08T00:00:00.000000 | 2024-08-08T00:00:00.000000 |
| CERTFR-2024-AVI-0659 | Multiples vulnérabilités dans GitLab | 2024-08-08T00:00:00.000000 | 2024-08-08T00:00:00.000000 |
| certfr-2024-avi-0658 | Multiples vulnérabilités dans Google Chrome | 2024-08-07T00:00:00.000000 | 2024-08-07T00:00:00.000000 |
| certfr-2024-avi-0657 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2024-08-07T00:00:00.000000 | 2024-08-07T00:00:00.000000 |
| certfr-2024-avi-0656 | Multiples vulnérabilités dans les produits Mozilla | 2024-08-07T00:00:00.000000 | 2024-08-07T00:00:00.000000 |