Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2023-31323 |
8.4 (4.0)
|
Type confusion in the AMD Secure Processor (ASP) … |
AMD |
AMD Radeon™ RX 5000 Series Graphics Products |
2026-02-12T17:45:12.151Z | 2026-02-12T18:33:47.900Z |
| CVE-2025-54519 |
7.3 (3.1)
|
A DLL hijacking vulnerability in Doc Nav could al… |
AMD |
Vivado™ Documentation Navigator Installation (Windows) |
2026-02-12T17:46:43.887Z | 2026-02-12T18:29:48.287Z |
| CVE-2023-20601 |
4.6 (4.0)
|
Improper input validation within RAS TA Driver ca… |
AMD |
AMD Radeon™ PRO VII |
2026-02-12T17:31:40.694Z | 2026-02-12T18:19:23.782Z |
| CVE-2026-20625 |
5.5 (3.1)
|
A parsing issue in the handling of directory path… |
Apple |
macOS |
2026-02-11T22:59:02.747Z | 2026-02-12T17:52:48.700Z |
| CVE-2024-36355 |
7 (4.0)
|
Improper input validation in the SMM handler coul… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:28:04.884Z | 2026-02-12T17:49:05.987Z |
| CVE-2026-20605 |
4.6 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
macOS |
2026-02-11T22:59:03.734Z | 2026-02-12T17:48:34.491Z |
| CVE-2026-2391 |
6.3 (4.0)
3.7 (3.1)
|
qs's arrayLimit bypass in comma parsing allows denial … |
|
|
2026-02-12T04:39:42.914Z | 2026-02-12T17:32:05.953Z |
| CVE-2025-70997 |
8.1 (3.1)
|
A vulnerability has been discovered in eladmin v2… |
n/a |
n/a |
2026-02-04T00:00:00.000Z | 2026-02-12T17:10:58.510Z |
| CVE-2025-43403 |
5.5 (3.1)
|
An authorization issue was addressed with improve… |
Apple |
macOS |
2026-02-11T22:58:17.254Z | 2026-02-12T17:01:43.381Z |
| CVE-2026-2323 |
4.3 (3.1)
|
Inappropriate implementation in Downloads in Goog… |
Google |
Chrome |
2026-02-11T18:08:06.261Z | 2026-02-12T17:01:31.747Z |
| CVE-2026-20666 |
5.5 (3.1)
|
An authorization issue was addressed with improve… |
Apple |
macOS |
2026-02-11T22:58:08.903Z | 2026-02-12T16:56:56.899Z |
| CVE-2025-43417 |
5.5 (3.1)
|
A path handling issue was addressed with improved… |
Apple |
macOS |
2026-02-11T22:58:31.572Z | 2026-02-12T16:47:54.266Z |
| CVE-2025-56647 |
6.5 (3.1)
|
npm @farmfe/core before 1.7.6 is Missing Origin V… |
n/a |
n/a |
2026-02-12T00:00:00.000Z | 2026-02-12T16:45:37.803Z |
| CVE-2025-46290 |
7.5 (3.1)
|
A logic issue was addressed with improved checks.… |
Apple |
macOS |
2026-02-11T22:58:34.079Z | 2026-02-12T16:43:15.134Z |
| CVE-2020-37186 |
9.3 (4.0)
9.8 (3.1)
|
Chevereto 3.13.4 Core - Remote Code Execution |
Chevere SpA |
Chevereto |
2026-02-11T20:37:08.738Z | 2026-02-12T16:34:10.535Z |
| CVE-2020-37187 |
4.6 (4.0)
7.5 (3.1)
|
SpotDialup 1.6.7 - 'Name' Denial of Service |
Nsasoft |
Nsauditor SpotDialup |
2026-02-11T20:37:09.524Z | 2026-02-12T16:30:18.842Z |
| CVE-2020-37188 |
4.6 (4.0)
7.5 (3.1)
|
SpotOutlook 1.2.6 - 'Name' Denial of Service |
Nsasoft |
Nsauditor SpotOutlook |
2026-02-11T20:37:10.344Z | 2026-02-12T16:29:41.406Z |
| CVE-2020-37189 |
4.6 (4.0)
7.5 (3.1)
|
TaskCanvas 1.4.0 - 'Registration' Denial Of Service |
DigitalVolcano Software |
TaskCanvas |
2026-02-11T20:37:11.180Z | 2026-02-12T16:29:05.923Z |
| CVE-2020-37192 |
6.7 (4.0)
6.2 (3.1)
|
MSN Password Recovery 1.30 - XML External Entity Injection |
Top Password Software |
MSN Password Recovery |
2026-02-11T20:37:13.631Z | 2026-02-12T16:28:25.912Z |
| CVE-2026-20671 |
3.1 (3.1)
|
A logic issue was addressed with improved checks.… |
Apple |
macOS |
2026-02-11T22:58:07.124Z | 2026-02-12T16:17:32.902Z |
| CVE-2020-37193 |
4.6 (4.0)
7.5 (3.1)
|
ZIP Password Recovery 2.30 - 'ZIP File' Denial of Service |
Top Password Software |
ZIP Password Recovery |
2026-02-11T20:37:14.439Z | 2026-02-12T16:14:21.983Z |
| CVE-2025-46310 |
6 (3.1)
|
This issue was addressed through improved state m… |
Apple |
macOS |
2026-02-11T22:58:56.379Z | 2026-02-12T16:12:49.303Z |
| CVE-2020-37194 |
4.6 (4.0)
7.5 (3.1)
|
Backup Key Recovery Recover Keys Crashed Hard Disk Dri… |
Nsasoft |
Nsauditor Backup Key Recovery Recover Keys Crashed Hard Disk Drive |
2026-02-11T20:37:15.508Z | 2026-02-12T16:05:32.086Z |
| CVE-2020-37195 |
4.6 (4.0)
7.5 (3.1)
|
BlueAuditor 1.7.2.0 - 'Name' Denial of Service |
Nsasoft |
BlueAuditor |
2026-02-11T20:37:16.524Z | 2026-02-12T16:04:56.819Z |
| CVE-2020-37209 |
4.6 (4.0)
7.5 (3.1)
|
SpotFTP FTP Password Recovery 3.0.0.0 - 'Name' Denial … |
Nsasoft |
Nsauditor SpotFTP FTP Password Recovery |
2026-02-11T20:37:28.215Z | 2026-02-12T16:04:16.475Z |
| CVE-2026-20630 |
5.5 (3.1)
|
A permissions issue was addressed with additional… |
Apple |
macOS |
2026-02-11T22:58:05.258Z | 2026-02-12T16:03:39.295Z |
| CVE-2020-37190 |
4.6 (4.0)
7.5 (3.1)
|
Top Password Firefox Password Recovery 2.8 - Denial of… |
Top Password Software |
Top Password Firefox Password Recovery |
2026-02-11T20:37:12.041Z | 2026-02-12T16:02:11.727Z |
| CVE-2026-20635 |
4.3 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
Safari |
2026-02-11T22:58:48.118Z | 2026-02-12T16:01:15.774Z |
| CVE-2020-37191 |
4.6 (4.0)
7.5 (3.1)
|
Top Password Software Dialup Password Recovery 1.30 - … |
Top Password Software |
Top Password Software Dialup Password Recovery |
2026-02-11T20:37:12.825Z | 2026-02-12T15:57:40.870Z |
| CVE-2020-37210 |
4.6 (4.0)
7.5 (3.1)
|
SpotIE 2.9.5 - 'Key' Denial of Service |
Nsasoft |
Nsauditor SpotIE |
2026-02-11T20:37:29.044Z | 2026-02-12T15:57:10.147Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-29946 |
4.5 (4.0)
|
Insufficient or Incomplete Data Removal in Hardwa… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:15:57.179Z | 2026-02-10T21:42:14.335Z |
| CVE-2025-29939 |
6.9 (4.0)
|
Improper access control in secure encrypted virtu… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:11:59.059Z | 2026-02-10T20:59:47.124Z |
| CVE-2025-27940 |
4.1 (3.1)
|
Out-of-bounds read for some TDX Module before ver… |
n/a |
TDX Module |
2026-02-10T16:25:31.294Z | 2026-02-10T17:34:39.346Z |
| CVE-2025-27708 |
4.1 (3.1)
|
Out-of-bounds read in the firmware for some Intel… |
n/a |
Intel(R) Converged Security and Management Engine (CSME) Firmware (FW) |
2026-02-10T16:25:29.434Z | 2026-02-10T17:32:52.392Z |
| CVE-2025-27572 |
4.1 (3.1)
|
Exposure of sensitive information during transien… |
n/a |
TDX |
2026-02-10T16:25:27.673Z | 2026-02-10T17:33:10.536Z |
| CVE-2025-27560 |
6 (3.1)
|
Loop with unreachable exit condition ('infinite l… |
n/a |
Intel(R) Platform |
2026-02-10T16:25:26.032Z | 2026-02-10T17:34:55.538Z |
| CVE-2025-27535 |
5.3 (3.1)
|
Exposed ioctl with insufficient access control in… |
n/a |
Intel(R) Ethernet Connection E825-C. |
2026-02-10T16:25:24.509Z | 2026-02-10T17:35:13.129Z |
| CVE-2025-27243 |
6 (3.1)
|
Out-of-bounds write in the firmware for some Inte… |
n/a |
Intel(R) Ethernet Controller E810 |
2026-02-10T16:25:22.636Z | 2026-02-10T17:35:30.173Z |
| CVE-2025-25210 |
8.2 (3.1)
|
Improper input validation for some Server Firmwar… |
n/a |
Server Firmware Update Utility(SysFwUpdt) |
2026-02-10T16:25:20.337Z | 2026-02-11T15:06:50.904Z |
| CVE-2025-25058 |
3.3 (3.1)
|
Improper initialization for some ESXi kernel mode… |
n/a |
Intel(R) Ethernet 800-Series |
2026-02-10T16:25:18.687Z | 2026-02-11T15:05:19.672Z |
| CVE-2025-24851 |
6 (3.1)
|
Uncaught exception in the firmware for some 100Gb… |
n/a |
100GbE Intel(R) Ethernet Controller E810 |
2026-02-10T16:25:16.878Z | 2026-02-10T17:35:48.247Z |
| CVE-2025-22885 |
4.7 (3.1)
|
Improper buffer restrictions in the firmware for … |
n/a |
TDX Module may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. |
2026-02-10T16:25:15.071Z | 2026-02-11T04:56:23.773Z |
| CVE-2025-22849 |
6.7 (3.1)
|
Incorrect default permissions for the Intel(R) Op… |
n/a |
Intel(R) Optane(TM) PMem management software |
2026-02-10T16:25:13.356Z | 2026-02-11T15:39:33.419Z |
| CVE-2025-22453 |
7.5 (3.1)
|
Improper input validation for some Server Firmwar… |
n/a |
Server Firmware Update Utility(SysFwUpdt) |
2026-02-10T16:25:11.476Z | 2026-02-11T15:04:25.092Z |
| CVE-2025-20106 |
6.7 (3.1)
|
Uncontrolled search path in some software install… |
n/a |
VTune(TM) Profiler software and Intel(R) oneAPI Base Toolkits |
2026-02-10T16:25:09.734Z | 2026-02-11T04:56:22.930Z |
| CVE-2025-20080 |
6.8 (3.1)
|
Null pointer dereference in the firmware for some… |
n/a |
Intel(R) AMT and Intel(R) Standard Manageability |
2026-02-10T16:25:07.842Z | 2026-02-11T15:02:46.280Z |
| CVE-2025-20070 |
6.7 (3.1)
|
Improper conditions check for the Intel(R) Optane… |
n/a |
Intel(R) Optane(TM) PMem management software |
2026-02-10T16:25:04.959Z | 2026-02-11T14:59:45.852Z |
| CVE-2025-12699 |
6.7 (4.0)
5.5 (3.1)
|
ZOLL ePCR IOS Mobile Application Insertion of Sensitiv… |
ZOLL |
ZOLL ePCR IOS Mobile Application |
2026-02-10T20:38:37.838Z | 2026-02-11T21:44:45.367Z |
| CVE-2025-0031 |
4.6 (4.0)
|
A use after free in the SEV firmware could allow … |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:14:58.027Z | 2026-02-11T14:51:07.017Z |
| CVE-2025-0029 |
1.8 (4.0)
|
Improper handling of error condition during host-… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:15:24.850Z | 2026-02-11T14:49:13.248Z |
| CVE-2025-0012 |
6.8 (4.0)
|
Improper handling of overlap between the segmente… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:12:24.892Z | 2026-02-10T20:57:16.835Z |
| CVE-2024-36311 |
4.6 (4.0)
|
A Time-of-check time-of-use (TOCTOU) race conditi… |
AMD |
AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics |
2026-02-10T19:50:06.871Z | 2026-02-10T20:43:15.862Z |
| CVE-2024-36310 |
4.6 (4.0)
|
Improper input validation in the SMM communicatio… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:24:21.681Z | 2026-02-10T21:26:51.882Z |
| CVE-2024-21953 |
5.9 (4.0)
|
Improper input validation in IOMMU could allow a … |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:11:17.966Z | 2026-02-10T21:00:57.491Z |
| CVE-2021-26410 |
1.8 (4.0)
|
Improper syscall input validation in ASP (AMD Sec… |
AMD |
AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics |
2026-02-10T19:48:36.645Z | 2026-02-12T14:12:04.201Z |
| CVE-2021-26381 |
7.1 (4.0)
|
Improper system call parameter validation in the … |
AMD |
AMD Ryzen™ Threadripper™ PRO 3000 WX-Series Processors |
2026-02-10T19:47:26.356Z | 2026-02-11T14:11:54.692Z |
| CVE-2026-1898 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
WeKan LDAP User Sync syncUser.js SyncLDAPBleed access … |
n/a |
WeKan |
2026-02-05T00:32:09.720Z | 2026-02-05T15:20:57.400Z |
| CVE-2020-37114 |
5.3 (4.0)
4.3 (3.1)
|
GUnet OpenEclass 1.7.3 E-learning platform - Informati… |
Openeclass |
GUnet OpenEclass |
2026-02-03T16:52:46.277Z | 2026-02-06T19:25:13.525Z |
| CVE-2020-37116 |
8.7 (4.0)
8.8 (3.1)
|
GUnet OpenEclass 1.7.3 E-learning platform - phpMyAdmi… |
Openeclass |
GUnet OpenEclass |
2026-02-03T16:52:47.396Z | 2026-02-04T18:41:09.692Z |
| CVE-2026-25061 |
5.5 (4.0)
|
tcpflow has TIM Element OOB Write in wifipcap |
simsong |
tcpflow |
2026-01-29T21:42:47.013Z | 2026-02-10T20:14:00.298Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-27572 | Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor… | 2026-02-10T17:16:14.763 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27560 | Loop with unreachable exit condition ('infinite loop') for some Intel(R) Platform within Ring 0: Ke… | 2026-02-10T17:16:14.600 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27535 | Exposed ioctl with insufficient access control in the firmware for some Intel(R) Ethernet Connectio… | 2026-02-10T17:16:14.427 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27243 | Out-of-bounds write in the firmware for some Intel(R) Ethernet Controller E810 before version cvl f… | 2026-02-10T17:16:14.183 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-25210 | Improper input validation for some Server Firmware Update Utility(SysFwUpdt) before version 16.0.12… | 2026-02-10T17:16:13.697 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-25058 | Improper initialization for some ESXi kernel mode driver for the Intel(R) Ethernet 800-Series befor… | 2026-02-10T17:16:13.490 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-24851 | Uncaught exception in the firmware for some 100GbE Intel(R) Ethernet Controller E810 before version… | 2026-02-10T17:16:12.890 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-22885 | Improper buffer restrictions in the firmware for the TDX Module may allow an escalation of privileg… | 2026-02-10T17:16:12.680 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-22849 | Incorrect default permissions for the Intel(R) Optane(TM) PMem management software before versions … | 2026-02-10T17:16:12.493 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-22453 | Improper input validation for some Server Firmware Update Utility(SysFwUpdt) before version 16.0.12… | 2026-02-10T17:16:12.280 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-20106 | Uncontrolled search path in some software installer for some VTune(TM) Profiler software and Intel(… | 2026-02-10T17:16:12.093 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-20080 | Null pointer dereference in the firmware for some Intel(R) AMT and Intel(R) Standard Manageability … | 2026-02-10T17:16:11.923 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-20070 | Improper conditions check for the Intel(R) Optane(TM) PMem management software before versions CR_M… | 2026-02-10T17:16:11.707 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-12699 | The ZOLL ePCR IOS application reflects unsanitized user input into a WebView. Attacker-controlled s… | 2026-02-10T21:15:59.187 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-0031 | A use after free in the SEV firmware could allow a malicous hypervisor to activate a migrated guest… | 2026-02-10T20:16:43.477 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-0029 | Improper handling of error condition during host-induced faults can allow a local high-privileged a… | 2026-02-10T20:16:43.337 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-0012 | Improper handling of overlap between the segmented reverse map table (RMP) and system management mo… | 2026-02-10T20:16:43.193 | 2026-02-10T21:51:48.077 |
| fkie_cve-2024-36311 | A Time-of-check time-of-use (TOCTOU) race condition in the SMM communications buffer could allow a … | 2026-02-10T20:16:42.687 | 2026-02-10T21:51:48.077 |
| fkie_cve-2024-36310 | Improper input validation in the SMM communications buffer could allow a privileged attacker to per… | 2026-02-10T20:16:42.550 | 2026-02-10T21:51:48.077 |
| fkie_cve-2024-21953 | Improper input validation in IOMMU could allow a malicious hypervisor to reconfigure IOMMU register… | 2026-02-10T20:16:42.407 | 2026-02-10T21:51:48.077 |
| fkie_cve-2021-26410 | Improper syscall input validation in ASP (AMD Secure Processor) may force the kernel into reading s… | 2026-02-10T20:16:42.227 | 2026-02-10T21:51:48.077 |
| fkie_cve-2021-26381 | Improper system call parameter validation in the Trusted OS may allow a malicious driver to perform… | 2026-02-10T20:16:41.110 | 2026-02-10T21:51:48.077 |
| fkie_cve-2026-1898 | A vulnerability was determined in WeKan up to 8.20. This affects an unknown part of the file packag… | 2026-02-05T01:15:53.507 | 2026-02-10T21:46:48.117 |
| fkie_cve-2020-37114 | GUnet OpenEclass 1.7.3 allows unauthenticated and authenticated users to access sensitive informati… | 2026-02-03T18:16:11.700 | 2026-02-10T21:25:23.153 |
| fkie_cve-2020-37116 | GUnet OpenEclass 1.7.3 includes phpMyAdmin 2.10.0.2 by default, which allows remote logins. Attacke… | 2026-02-03T18:16:12.040 | 2026-02-10T21:20:24.043 |
| fkie_cve-2026-25061 | tcpflow is a TCP/IP packet demultiplexer. In versions up to and including 1.61, wifipcap parses 802… | 2026-01-29T22:15:55.797 | 2026-02-10T21:16:05.307 |
| fkie_cve-2025-3569 | A vulnerability was found in JamesZBL/code-projects db-hospital-drug 1.0 and classified as critical… | 2025-04-14T14:15:25.813 | 2026-02-10T21:12:05.753 |
| fkie_cve-2020-37115 | GUnet OpenEclass 1.7.3 stores user credentials in plaintext, allowing administrators to view all re… | 2026-02-03T18:16:11.870 | 2026-02-10T21:10:35.623 |
| fkie_cve-2025-59891 | Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk … | 2026-01-28T12:15:50.540 | 2026-02-10T21:08:50.623 |
| fkie_cve-2025-59892 | Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk … | 2026-01-28T12:15:50.690 | 2026-02-10T21:08:39.607 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-frpp-8pwq-hjrx |
4.3 (3.1)
|
Hibernate Reactive Vulnerable to DoS via Connection Pool Exhaustion | 2026-01-26T21:30:36Z | 2026-02-05T15:31:09Z |
| ghsa-2cqf-mg5g-39xv |
9.8 (3.1)
|
An Incorrect Symlink Follow vulnerability exists in multiple Yottamaster NAS devices, including DM2… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-27qh-whg4-7h58 |
9.8 (3.1)
|
A buffer overflow vulnerability exists in the setParentalRules interface of TOTOLINK A950RG V4.1.2c… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-rf5c-crcv-v9wg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: tipc: fix an information leak … | 2025-10-07T18:31:08Z | 2026-02-05T15:31:08Z |
| ghsa-qhmw-vr57-jm8g |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: memcontrol: ensure memcg acqui… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ghsa-q5wr-hr4c-4mfv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mlme: fix null… | 2025-10-07T18:31:08Z | 2026-02-05T15:31:08Z |
| ghsa-mh3q-xm25-mf6x |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix possible re… | 2025-10-07T18:31:08Z | 2026-02-05T15:31:08Z |
| ghsa-gjrx-w6pw-88ph |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: md: fix soft lockup in status_… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ghsa-g6cv-6crr-3rp7 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix null pointer deref… | 2025-10-07T18:31:08Z | 2026-02-05T15:31:08Z |
| ghsa-fj8x-7xh8-225g |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: Avoid nf… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ghsa-9pvh-f984-w7rj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: soc: aspeed: socinfo: Add kfre… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ghsa-84fr-rw9r-j8p4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: dm thin: Use last transaction'… | 2025-10-07T18:31:08Z | 2026-02-05T15:31:08Z |
| ghsa-7fh7-rm8f-wj9x |
7.0 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix possible data races … | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ghsa-6jh6-f787-4g5p |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: tipc: fix a null-ptr-deref in … | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ghsa-2qcj-hqq8-v6f6 |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mm/swap: fix swap_info_struct … | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ghsa-2244-8r8j-955v |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: reject invalid reloc tr… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ghsa-vvwr-r28w-f48x |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix a pote… | 2025-10-07T18:31:07Z | 2026-02-05T15:31:07Z |
| ghsa-rxrm-m4vp-vchq |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: perf/smmuv3: Fix hotplug callb… | 2025-10-07T18:31:07Z | 2026-02-05T15:31:07Z |
| ghsa-chj4-grxw-4pvw |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: test_firmware: fix memory leak… | 2025-10-07T18:31:08Z | 2026-02-05T15:31:07Z |
| ghsa-c5x6-wf2w-722j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: coda: Add check for kma… | 2025-10-07T18:31:07Z | 2026-02-05T15:31:07Z |
| ghsa-72cp-v89q-9p3w |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: lib/fonts: fix undefined behav… | 2025-10-07T18:31:07Z | 2026-02-05T15:31:07Z |
| ghsa-6f74-35r6-2p5x |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential memory lea… | 2025-10-07T18:31:07Z | 2026-02-05T15:31:07Z |
| ghsa-64fm-8hw2-v72w |
6.5 (3.1)
|
KaTeX's maxExpand bypassed by `\edef` | 2024-03-25T19:38:18Z | 2026-02-05T15:26:49Z |
| ghsa-4gpc-rhpj-9443 |
9.6 (3.1)
|
Lobe Chat affected by Cross-Site Scripting(XSS) that can escalate to Remote Code Execution(RCE) | 2026-01-20T17:54:49Z | 2026-02-05T13:40:47Z |
| ghsa-g7h5-x73h-q9px |
7.2 (3.1)
|
Improper access control in the TeamViewer Full and Host clients (Windows, macOS, Linux) prior versi… | 2026-02-05T12:30:26Z | 2026-02-05T12:30:26Z |
| ghsa-5653-wcrh-6wrg |
2.4 (4.0)
|
YugabyteDB Anywhere displays LDAP bind passwords configured via gflags in cleartext within the web … | 2026-02-05T12:30:26Z | 2026-02-05T12:30:26Z |
| ghsa-rm46-f8vq-9224 |
6.1 (3.1)
|
The Peter's Date Countdown plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via… | 2026-02-05T12:30:25Z | 2026-02-05T12:30:25Z |
| ghsa-c33w-hvc2-q76p |
5.3 (3.1)
|
The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to Missi… | 2026-02-05T12:30:25Z | 2026-02-05T12:30:25Z |
| ghsa-943c-ghg8-8g2w |
5.3 (3.1)
|
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Insec… | 2026-02-05T12:30:25Z | 2026-02-05T12:30:25Z |
| ghsa-8w4f-pqvp-553j |
7.2 (3.1)
|
The All In One Image Viewer Block plugin for WordPress is vulnerable to Server-Side Request Forgery… | 2026-02-05T12:30:25Z | 2026-02-05T12:30:25Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2023-7254 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:02:05.539555Z |
| gsd-2011-10006 | A vulnerability was found in GamerZ WP-PostRatings up to 1.64. It has been classified as … | 2024-04-11T05:00:43.321828Z |
| gsd-2024-29221 | Improper Access Control in Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.… | 2024-04-04T05:02:31.403775Z |
| gsd-2024-3267 | The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting v… | 2024-04-04T05:02:30.853479Z |
| gsd-2024-3266 | The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting v… | 2024-04-04T05:02:30.825048Z |
| gsd-2024-3265 | The Advanced Search WordPress plugin through 1.1.6 does not properly escape parameters ap… | 2024-04-04T05:02:30.813359Z |
| gsd-2024-3264 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-04T05:02:30.816836Z |
| gsd-2024-3263 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-04T05:02:30.808380Z |
| gsd-2024-3262 | Information exposure vulnerability in RT software affecting version 4.4.1. This vulnerabi… | 2024-04-04T05:02:30.823238Z |
| gsd-2024-3261 | The Strong Testimonials WordPress plugin before 3.1.12 does not validate and escape some … | 2024-04-04T05:02:30.793220Z |
| gsd-2024-3260 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-04T05:02:30.796991Z |
| gsd-2024-3259 | A vulnerability was found in SourceCodester Internship Portal Management System 1.0. It h… | 2024-04-04T05:02:30.825389Z |
| gsd-2024-3258 | A vulnerability was found in SourceCodester Internship Portal Management System 1.0. It h… | 2024-04-04T05:02:30.784283Z |
| gsd-2024-3257 | A vulnerability was found in SourceCodester Internship Portal Management System 1.0 and c… | 2024-04-04T05:02:30.879722Z |
| gsd-2024-3256 | A vulnerability has been found in SourceCodester Internship Portal Management System 1.0 … | 2024-04-04T05:02:30.828504Z |
| gsd-2024-3255 | A vulnerability, which was classified as critical, was found in SourceCodester Internship… | 2024-04-04T05:02:30.869559Z |
| gsd-2024-3254 | A vulnerability, which was classified as critical, has been found in SourceCodester Inter… | 2024-04-04T05:02:30.883544Z |
| gsd-2024-3253 | A vulnerability classified as critical was found in SourceCodester Internship Portal Mana… | 2024-04-04T05:02:30.854278Z |
| gsd-2024-3252 | A vulnerability classified as critical has been found in SourceCodester Internship Portal… | 2024-04-04T05:02:30.839426Z |
| gsd-2024-3251 | A vulnerability was found in SourceCodester Computer Laboratory Management System 1.0. It… | 2024-04-04T05:02:30.834998Z |
| gsd-2024-28949 | Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.… | 2024-04-04T05:02:29.092084Z |
| gsd-2024-31440 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-04T05:02:26.610777Z |
| gsd-2024-31439 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-04T05:02:26.589220Z |
| gsd-2024-31438 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-04T05:02:26.604583Z |
| gsd-2024-31437 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-04T05:02:26.580343Z |
| gsd-2024-31436 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-04T05:02:26.553257Z |
| gsd-2024-31435 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-04T05:02:26.637310Z |
| gsd-2024-31434 | Cross-Site Request Forgery (CSRF) vulnerability in Stefano Lissa & The Newsletter Team Ne… | 2024-04-04T05:02:26.530116Z |
| gsd-2024-31433 | Cross-Site Request Forgery (CSRF) vulnerability in The Events Calendar.This issue affects… | 2024-04-04T05:02:26.555244Z |
| gsd-2024-31432 | Missing Authorization vulnerability in StellarWP Restrict Content.This issue affects Rest… | 2024-04-04T05:02:26.527107Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-192171 | Malicious code in elf-stats-sugarplum-fireplace-278 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-192169 | Malicious code in elf-stats-storybook-reindeer-552 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| mal-2025-191974 | Malicious code in elf-stats-wintry-northstar-674 (npm) | 2025-12-03T12:25:23Z | 2025-12-23T22:09:11Z |
| MAL-2025-192628 | Malicious code in elf-stats-wintry-chimney-348 (npm) | 2025-12-19T08:44:11Z | 2025-12-23T22:09:11Z |
| MAL-2025-192540 | Malicious code in elf-stats-twinkling-wishlist-283 (npm) | 2025-12-11T19:46:09Z | 2025-12-23T22:09:11Z |
| MAL-2025-192534 | Malicious code in elf-stats-sugarplum-snowman-116 (npm) | 2025-12-11T19:46:09Z | 2025-12-23T22:09:11Z |
| MAL-2025-192286 | Malicious code in elf-stats-tinsel-sparkler-289 (npm) | 2025-12-03T19:38:32Z | 2025-12-23T22:09:11Z |
| MAL-2025-192285 | Malicious code in elf-stats-sugarplum-cookiejar-287 (npm) | 2025-12-03T19:42:46Z | 2025-12-23T22:09:11Z |
| MAL-2025-192270 | Malicious code in elf-stats-tinsel-candy-605 (npm) | 2025-12-03T18:49:05Z | 2025-12-23T22:09:11Z |
| MAL-2025-192243 | Malicious code in elf-stats-wintry-cocoa-831 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| MAL-2025-192241 | Malicious code in elf-stats-velvet-snowman-470 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| MAL-2025-192240 | Malicious code in elf-stats-velvet-ornament-148 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| MAL-2025-192238 | Malicious code in elf-stats-sugarplum-muffin-944 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| MAL-2025-192237 | Malicious code in elf-stats-storybook-snowglobe-157 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| MAL-2025-192198 | Malicious code in elf-stats-wintry-ornament-960 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192196 | Malicious code in elf-stats-wintry-hollyberry-832 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192194 | Malicious code in elf-stats-wintry-fir-892 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192192 | Malicious code in elf-stats-whimsical-rocket-922 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192191 | Malicious code in elf-stats-whimsical-muffin-613 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192190 | Malicious code in elf-stats-whimsical-marshmallow-258 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192189 | Malicious code in elf-stats-whimsical-marshmallow-212 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192188 | Malicious code in elf-stats-whimsical-ledger-767 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192187 | Malicious code in elf-stats-whimsical-lantern-823 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192181 | Malicious code in elf-stats-twinkling-marshmallow-913 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192178 | Malicious code in elf-stats-tinsel-pantry-856 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192173 | Malicious code in elf-stats-sugarplum-star-404 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192171 | Malicious code in elf-stats-sugarplum-fireplace-278 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192169 | Malicious code in elf-stats-storybook-reindeer-552 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-191974 | Malicious code in elf-stats-wintry-northstar-674 (npm) | 2025-12-03T12:25:23Z | 2025-12-23T22:09:11Z |
| mal-2025-192533 | Malicious code in elf-stats-sprucey-train-710 (npm) | 2025-12-11T19:46:09Z | 2025-12-23T21:38:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0775 | Bitdefender Produkte: Schwachstelle ermöglicht Privilegieneskalation | 2024-04-03T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0774 | xpdf: Schwachstelle ermöglicht Denial of Service | 2024-04-03T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0772 | Cisco TelePresence: Schwachstelle ermöglicht Cross-Site Scripting | 2024-04-03T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0770 | xpdf: Schwachstelle ermöglicht Denial of Service | 2024-04-02T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0767 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2024-04-02T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0764 | VMware SD-WAN: Mehrere Schwachstellen | 2024-04-02T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0760 | MediaWiki: Mehrere Schwachstellen | 2024-04-01T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0759 | Elasticsearch: Schwachstelle ermöglicht Denial of Service | 2024-04-01T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0756 | JetBrains TeamCity: Mehrere Schwachstellen | 2024-04-01T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0754 | TYPO3 Extension "oidc": Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-04-01T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0752 | Imperva SecureSphere: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-04-01T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0746 | SugarCRM Sugar Enterprise: Mehrere Schwachstellen | 2024-03-27T23:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0738 | Microsoft Edge: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-03-27T23:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0733 | GitLab: Mehrere Schwachstellen | 2024-03-27T23:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0732 | Splunk Splunk Enterprise: Mehrere Schwachstellen | 2024-03-27T23:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0725 | Hitachi Energy RTU500: Mehrere Schwachstellen | 2024-03-26T23:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0724 | xpdf: Schwachstelle ermöglicht Denial of Service | 2024-03-26T23:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0717 | Aruba ArubaOS: Schwachstelle ermöglicht Denial of Service | 2024-03-26T23:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0498 | FRRouting Project FRRouting: Schwachstelle ermöglicht Denial of Service | 2024-02-27T23:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2023-2832 | FRRouting Project FRRouting: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-11-05T23:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2023-2822 | FRRouting Project FRRouting: Mehrere Schwachstellen | 2023-11-05T23:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2023-2748 | FRRouting: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-10-25T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2023-2263 | FRRouting Project FRRouting: Schwachstelle ermöglicht Denial of Service | 2023-09-04T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2023-2205 | FRRouting Project FRRouting: Schwachstelle ermöglicht Denial of Service | 2023-08-29T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2023-2196 | FRRouting Project FRRouting: Mehrere Schwachstellen | 2023-08-28T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2023-1787 | FRRouting Project FRRouting: Schwachstelle ermöglicht Denial of Service | 2023-07-18T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2023-1181 | FRRouting Project FRRouting: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-05-09T22:00:00.000+00:00 | 2024-11-27T23:00:00.000+00:00 |
| wid-sec-w-2024-3556 | Zabbix: Mehrere Schwachstellen | 2024-11-26T23:00:00.000+00:00 | 2024-11-26T23:00:00.000+00:00 |
| wid-sec-w-2024-3554 | Arista EOS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-11-26T23:00:00.000+00:00 | 2024-11-26T23:00:00.000+00:00 |
| wid-sec-w-2024-3553 | Microsoft Dynamics 365: Schwachstelle ermöglicht Darstellen falscher Informationen | 2024-11-26T23:00:00.000+00:00 | 2024-11-26T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:3138 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 2024-05-22T10:03:03+00:00 | 2026-02-18T19:20:31+00:00 |
| rhsa-2023:7557 | Red Hat Security Advisory: kernel security and bug fix update | 2023-11-28T18:18:52+00:00 | 2026-02-18T19:20:31+00:00 |
| rhsa-2023:7551 | Red Hat Security Advisory: kernel-rt security update | 2023-11-28T16:24:57+00:00 | 2026-02-18T19:20:30+00:00 |
| rhsa-2024:1382 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2024-03-19T15:10:47+00:00 | 2026-02-18T19:20:29+00:00 |
| rhsa-2024:1367 | Red Hat Security Advisory: kernel security and bug fix update | 2024-03-19T00:27:39+00:00 | 2026-02-18T19:20:29+00:00 |
| rhsa-2023:5775 | Red Hat Security Advisory: kpatch-patch security update | 2023-10-17T09:27:38+00:00 | 2026-02-18T19:20:29+00:00 |
| rhsa-2024:1377 | Red Hat Security Advisory: kpatch-patch security update | 2024-03-19T14:42:32+00:00 | 2026-02-18T19:20:28+00:00 |
| rhsa-2024:0262 | Red Hat Security Advisory: kernel security update | 2024-01-16T15:57:34+00:00 | 2026-02-18T19:20:27+00:00 |
| rhsa-2024:0261 | Red Hat Security Advisory: kernel security update | 2024-01-16T15:56:24+00:00 | 2026-02-18T19:20:21+00:00 |
| rhsa-2023:7424 | Red Hat Security Advisory: kernel-rt security update | 2023-11-21T15:12:59+00:00 | 2026-02-18T19:20:21+00:00 |
| rhsa-2023:7423 | Red Hat Security Advisory: kernel security update | 2023-11-21T15:47:34+00:00 | 2026-02-18T19:20:21+00:00 |
| rhsa-2024:2950 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2024-05-22T10:16:27+00:00 | 2026-02-18T19:20:20+00:00 |
| rhsa-2023:5548 | Red Hat Security Advisory: kpatch-patch security update | 2023-10-10T09:46:02+00:00 | 2026-02-18T19:20:20+00:00 |
| rhsa-2023:7294 | Red Hat Security Advisory: kernel security update | 2023-11-15T20:35:20+00:00 | 2026-02-18T19:20:19+00:00 |
| rhsa-2023:7243 | Red Hat Security Advisory: kernel security update | 2023-11-15T17:46:08+00:00 | 2026-02-18T19:20:19+00:00 |
| rhsa-2023:7539 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 2023-11-28T15:40:03+00:00 | 2026-02-18T19:20:18+00:00 |
| rhsa-2023:5574 | Red Hat Security Advisory: kpatch-patch security update | 2023-10-10T10:28:31+00:00 | 2026-02-18T19:20:18+00:00 |
| rhsa-2023:5235 | Red Hat Security Advisory: kpatch-patch security update | 2023-09-19T12:42:34+00:00 | 2026-02-18T19:20:18+00:00 |
| rhsa-2023:5575 | Red Hat Security Advisory: kpatch-patch security update | 2023-10-10T10:16:20+00:00 | 2026-02-18T19:20:17+00:00 |
| rhsa-2023:6813 | Red Hat Security Advisory: kernel security and bug fix update | 2023-11-08T11:00:24+00:00 | 2026-02-18T19:20:16+00:00 |
| rhsa-2023:5794 | Red Hat Security Advisory: kernel-rt security update | 2023-10-17T15:09:43+00:00 | 2026-02-18T19:20:15+00:00 |
| rhsa-2023:5221 | Red Hat Security Advisory: kpatch-patch security update | 2023-09-19T08:06:11+00:00 | 2026-02-18T19:20:15+00:00 |
| rhsa-2023:7370 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 2023-11-21T11:31:20+00:00 | 2026-02-18T19:20:14+00:00 |
| rhsa-2023:7379 | Red Hat Security Advisory: kernel-rt security update | 2023-11-21T10:27:55+00:00 | 2026-02-18T19:20:13+00:00 |
| rhsa-2023:5628 | Red Hat Security Advisory: kernel security and bug fix update | 2023-10-10T16:28:08+00:00 | 2026-02-18T19:20:13+00:00 |
| rhsa-2023:5627 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 2023-10-10T16:31:57+00:00 | 2026-02-18T19:20:13+00:00 |
| rhsa-2023:5414 | Red Hat Security Advisory: kernel security update | 2023-10-03T07:17:35+00:00 | 2026-02-18T19:20:13+00:00 |
| rhsa-2023:5093 | Red Hat Security Advisory: kpatch-patch security update | 2023-09-12T09:56:21+00:00 | 2026-02-18T19:20:12+00:00 |
| rhsa-2023:5622 | Red Hat Security Advisory: kernel security and bug fix update | 2023-10-10T16:24:01+00:00 | 2026-02-18T19:20:11+00:00 |
| rhsa-2023:5621 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2023-10-10T15:54:21+00:00 | 2026-02-18T19:20:11+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-187-01 | Siemens OZW672 and OZW772 | 2017-07-06T00:00:00.000000Z | 2017-07-06T00:00:00.000000Z |
| icsa-17-180-03 | Siemens Viewport for Web Office Portal | 2017-06-29T00:00:00.000000Z | 2017-06-29T00:00:00.000000Z |
| icsa-17-178-01 | Newport XPS-Cx, XPS-Qx | 2017-06-27T00:00:00.000000Z | 2017-06-27T00:00:00.000000Z |
| icsa-17-173-02 | Siemens XHQ | 2017-06-22T00:00:00.000000Z | 2017-06-22T00:00:00.000000Z |
| icsa-17-173-01 | Siemens SIMATIC CP 44x-1 Redundant Network Access Modules | 2017-06-22T00:00:00.000000Z | 2017-06-22T00:00:00.000000Z |
| icsa-17-171-01 | Ecava IntegraXor | 2017-06-20T00:00:00.000000Z | 2017-06-20T00:00:00.000000Z |
| icsa-17-166-01 | Cambium Networks ePMP | 2017-06-15T00:00:00.000000Z | 2017-06-15T00:00:00.000000Z |
| icsa-17-164-03 | OSIsoft PI Web API 2017 | 2017-06-13T00:00:00.000000Z | 2017-06-13T00:00:00.000000Z |
| icsa-17-164-02 | OSIsoft PI Server 2017 | 2017-06-13T00:00:00.000000Z | 2017-06-13T00:00:00.000000Z |
| icsa-17-164-01 | Trihedral Engineering Limited VTScada | 2017-06-13T00:00:00.000000Z | 2017-06-13T00:00:00.000000Z |
| icsa-17-157-02 | Digital Canal Structural Wind Analysis | 2017-06-06T00:00:00.000000Z | 2017-06-06T00:00:00.000000Z |
| icsa-17-157-01 | Rockwell Automation PanelView Plus 6 700-1500 | 2017-06-06T00:00:00.000000Z | 2017-06-06T00:00:00.000000Z |
| icsa-17-152-01 | Phoenix Broadband Technologies LLC PowerAgent SC3 Site Controller | 2017-06-01T00:00:00.000000Z | 2017-06-01T00:00:00.000000Z |
| icsma-17-082-02 | ICSMA-17-082-02_B. Braun Medical SpaceCom Open Redirect Vulnerability | 2017-03-23T00:00:00.000000Z | 2017-05-23T00:00:00.000000Z |
| icsa-17-143-01 | Moxa OnCell | 2017-05-23T00:00:00.000000Z | 2017-05-23T00:00:00.000000Z |
| icsa-17-115-04 | Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 | 2017-04-25T00:00:00.000000Z | 2017-05-23T00:00:00.000000Z |
| icsa-17-138-02 | Schneider Electric Wonderware InduSoft Web Studio | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| icsa-17-138-01 | ICSA-17-138-01_Miele Professional PG 85 Series | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| icsa-17-136-04 | Schneider Electric VAMPSET | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-03 | Hanwha Techwin SRN-4000 | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-02 | Schneider Electric SoMachine HVAC | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-01 | Detcon SiteWatch Gateway | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-131-02 | Satel Iberia SenNet Data Logger and Electricity Meters | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| icsa-17-131-01 | PHOENIX CONTACT mGuard | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| icsa-17-129-03 | Siemens SIMATIC WinCC and SIMATIC WinCC Runtime Professional | 2017-05-09T00:00:00.000000Z | 2017-05-09T00:00:00.000000Z |
| icsa-17-124-03 | Advantech WebAccess | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-124-02 | Dahua Technology Co., Ltd Digital Video Recorders and IP Cameras | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-124-01 | Hikvision Cameras | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-094-05 | Rockwell Automation ControlLogix 5580 and CompactLogix 5380 | 2017-04-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-122-03 | Advantech B+B SmartWorx MESR901 | 2017-05-02T00:00:00.000000Z | 2017-05-02T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20190306-nxosldap | Cisco FXOS and NX-OS Lightweight Directory Access Protocol Denial of Service Vulnerabilities | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-privesca | Cisco NX-OS Software Privilege Escalation Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-privesc | Cisco NX-OS Software Privilege Escalation Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-pe | Cisco NX-OS Software Bash Shell Privilege Escalation Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-nxapi-cmdinj | Cisco NX-OS Software NX-API Command Injection Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-npv-dos | Cisco Nexus 9000 Series Switches Standalone NX-OS Mode Fibre Channel over Ethernet NPV Denial of Service Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-netstack | Cisco NX-OS Software Netstack Denial of Service Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-escalation | Cisco NX-OS Software Privilege Escalation Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-directory | Cisco FXOS and NX-OS Software Unauthorized Directory Access Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-cmdinj-1612 | Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1612) | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-cmdinj-1611 | Cisco FXOS and NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1611) | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-cmdinj-1610 | Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1610) | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-cmdinj-1609 | Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1609) | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-cmdinj-1608 | Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1608) | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-cmdinj-1607 | Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1607) | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-cmdinj-1606 | Cisco NX-OS Software CLI Command Injection Vulnerability (CVE-2019-1606) | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nxos-NXAPI-cmdinj | Cisco NX-OS Software NX-API Command Injection Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nx-os-lan-auth | Cisco NX-OS Software 802.1X Extensible Authentication Protocol over LAN Denial of Service Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nx-os-bash-escal | Cisco NX-OS Software Bash Shell Role-Based Access Control Bypass Privilege Escalation Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nx-os-api-ex | Cisco NX-OS Software NX-API Arbitrary Code Execution Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-nexus-fbr-dos | Cisco Nexus 5600 and 6000 Series Switches Fibre Channel over Ethernet Denial of Service Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-info-poap | Action Recommended to Secure the Cisco Nexus PowerOn Auto Provisioning Feature | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-dna-xss | Cisco DNA Center Access Contract Stored Cross-Site Scripting Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-chatmail-xss | Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerabilities | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-aci-file-read | Cisco Nexus 9000 Series Fabric Switches Application-Centric Infrastructure Mode Arbitrary File Read Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190306-aci-controller-privsec | Cisco Nexus 9000 Series Fabric Switches Application-Centric Infrastructure Mode Privilege Escalation Vulnerability | 2019-03-06T16:00:00+00:00 | 2019-03-06T16:00:00+00:00 |
| cisco-sa-20190227-wmda-cmdinj | Cisco Webex Meetings Desktop App and Cisco Webex Productivity Tools Update Service Command Injection Vulnerability | 2019-02-27T16:00:00+00:00 | 2019-02-27T16:00:00+00:00 |
| cisco-sa-20190206-webex-injection | Cisco Webex Meetings Online Content Injection Vulnerability | 2019-02-06T16:00:00+00:00 | 2019-02-20T23:23:00+00:00 |
| cisco-sa-20190220-webx-ios-file | Cisco Webex Teams for iOS Arbitrary File Upload Vulnerability | 2019-02-20T16:00:00+00:00 | 2019-02-20T16:00:00+00:00 |
| cisco-sa-20190220-prime-validation | Cisco Prime Infrastructure Certificate Validation Vulnerability | 2019-02-20T16:00:00+00:00 | 2019-02-20T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-39673 | ppp: fix race conditions in ppp_fill_forward_path | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:26.000Z |
| msrc_cve-2025-38699 | scsi: bfa: Double-free fix | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:17.000Z |
| msrc_cve-2025-38666 | net: appletalk: Fix use-after-free in AARP proxy probe | 2025-08-02T00:00:00.000Z | 2026-01-09T01:07:06.000Z |
| msrc_cve-2025-38665 | can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode | 2025-08-02T00:00:00.000Z | 2026-01-09T01:06:57.000Z |
| msrc_cve-2025-38664 | ice: Fix a null pointer dereference in ice_copy_and_init_pkg() | 2025-08-02T00:00:00.000Z | 2026-01-09T01:06:48.000Z |
| msrc_cve-2025-38652 | f2fs: fix to avoid out-of-boundary access in devs.path | 2025-08-02T00:00:00.000Z | 2026-01-09T01:06:31.000Z |
| msrc_cve-2025-38645 | net/mlx5: Check device memory pointer before usage | 2025-08-02T00:00:00.000Z | 2026-01-09T01:06:13.000Z |
| msrc_cve-2025-38622 | net: drop UFO packets in udp_rcv_segment() | 2025-08-02T00:00:00.000Z | 2026-01-09T01:05:56.000Z |
| msrc_cve-2025-38618 | vsock: Do not allow binding to VMADDR_PORT_ANY | 2025-08-02T00:00:00.000Z | 2026-01-09T01:05:47.000Z |
| msrc_cve-2025-38617 | net/packet: fix a race in packet_set_ring() and packet_notifier() | 2025-08-02T00:00:00.000Z | 2026-01-09T01:05:39.000Z |
| msrc_cve-2025-38612 | staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() | 2025-08-02T00:00:00.000Z | 2026-01-09T01:05:31.000Z |
| msrc_cve-2025-38609 | PM / devfreq: Check governor before using governor->name | 2025-08-02T00:00:00.000Z | 2026-01-09T01:05:22.000Z |
| msrc_cve-2025-38608 | bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls | 2025-08-02T00:00:00.000Z | 2026-01-09T01:05:11.000Z |
| msrc_cve-2025-38604 | wifi: rtl818x: Kill URBs before clearing tx status queue | 2025-08-02T00:00:00.000Z | 2026-01-09T01:05:02.000Z |
| msrc_cve-2025-38602 | iwlwifi: Add missing check for alloc_ordered_workqueue | 2025-08-02T00:00:00.000Z | 2026-01-09T01:04:54.000Z |
| msrc_cve-2025-38561 | ksmbd: fix Preauh_HashValue race condition | 2025-08-02T00:00:00.000Z | 2026-01-09T01:04:36.000Z |
| msrc_cve-2025-38552 | mptcp: plug races between subflow fail and subflow creation | 2025-08-02T00:00:00.000Z | 2026-01-09T01:04:28.000Z |
| msrc_cve-2025-38550 | ipv6: mcast: Delay put pmc->idev in mld_del_delrec() | 2025-08-02T00:00:00.000Z | 2026-01-09T01:04:19.000Z |
| msrc_cve-2025-38548 | hwmon: (corsair-cpro) Validate the size of the received input buffer | 2025-08-02T00:00:00.000Z | 2026-01-09T01:04:10.000Z |
| msrc_cve-2025-38546 | atm: clip: Fix memory leak of struct clip_vcc. | 2025-08-02T00:00:00.000Z | 2026-01-09T01:04:01.000Z |
| msrc_cve-2025-38542 | net: appletalk: Fix device refcount leak in atrtr_create() | 2025-08-02T00:00:00.000Z | 2026-01-09T01:03:53.000Z |
| msrc_cve-2025-38539 | tracing: Add down_write(trace_event_sem) when adding trace event | 2025-08-02T00:00:00.000Z | 2026-01-09T01:03:44.000Z |
| msrc_cve-2025-38538 | dmaengine: nbpfaxi: Fix memory corruption in probe() | 2025-08-02T00:00:00.000Z | 2026-01-09T01:03:35.000Z |
| msrc_cve-2025-38535 | phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode | 2025-08-02T00:00:00.000Z | 2026-01-09T01:03:26.000Z |
| msrc_cve-2025-38530 | comedi: pcl812: Fix bit shift out of bounds | 2025-08-02T00:00:00.000Z | 2026-01-09T01:03:17.000Z |
| msrc_cve-2025-38529 | comedi: aio_iiro_16: Fix bit shift out of bounds | 2025-08-02T00:00:00.000Z | 2026-01-09T01:03:09.000Z |
| msrc_cve-2025-38528 | bpf: Reject %p% format string in bprintf-like helpers | 2025-08-02T00:00:00.000Z | 2026-01-09T01:03:00.000Z |
| msrc_cve-2025-38527 | smb: client: fix use-after-free in cifs_oplock_break | 2025-08-02T00:00:00.000Z | 2026-01-09T01:02:52.000Z |
| msrc_cve-2025-38520 | drm/amdkfd: Don't call mmput from MMU notifier callback | 2025-08-02T00:00:00.000Z | 2026-01-09T01:02:43.000Z |
| msrc_cve-2025-38516 | pinctrl: qcom: msm: mark certain pins as invalid for interrupts | 2025-08-02T00:00:00.000Z | 2026-01-09T01:02:34.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:12800-1 | flatpak-1.14.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12799-1 | libopusfile0-0.12-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12798-1 | go1.18-1.18.10-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12797-1 | a2ps-4.15-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12796-1 | xstream-1.4.20-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12795-1 | sudo-1.9.13p3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12794-1 | ruby3.1-rubygem-grpc-1.52.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12793-1 | nodejs-electron-22.3.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12792-1 | kubevirt-container-disk-0.59.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12791-1 | MozillaThunderbird-102.9.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12790-1 | docker-20.10.23_ce-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12789-1 | ruby3.1-rubygem-rack-2.2-2.2.6.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12788-1 | python310-Werkzeug-2.2.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12787-1 | oci-cli-3.23.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12786-1 | libmozjs-102-0-102.9.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12785-1 | libwireshark16-4.0.4-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12784-1 | ruby3.1-rubygem-rack-2.2-2.2.6.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12783-1 | liferea-1.14.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12782-1 | hotspot-1.4.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12781-1 | kubernetes1.24-apiserver-1.24.11-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12780-1 | kubernetes1.23-apiserver-1.23.17-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12779-1 | kernel-devel-6.2.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12778-1 | libQt5Pdf5-5.15.13-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12777-1 | emacs-28.2-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12776-1 | apache2-2.4.56-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12775-1 | chromedriver-111.0.5563.64-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12774-1 | gvim-9.0.1392-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12773-1 | ruby3.1-rubygem-rack-3.0.4.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12772-1 | python310-markdown-it-py-2.2.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12771-1 | podman-4.4.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2018-61 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2021-01-13T00:00:30.115037Z | 2022-04-13T03:04:32.896822Z |
| osv-2018-54 | UNKNOWN READ in BEInt<short, 2>::operator short | 2021-01-13T00:00:28.751017Z | 2022-04-13T03:04:32.968914Z |
| osv-2018-228 | Heap-buffer-overflow in g_variant_serialiser_is_string | 2021-01-13T00:01:34.116112Z | 2022-04-13T03:04:32.546035Z |
| osv-2018-22 | Heap-buffer-overflow in gvs_read_unaligned_le | 2021-01-13T00:00:09.013990Z | 2022-04-13T03:04:32.539752Z |
| osv-2018-216 | Heap-buffer-overflow in token_stream_prepare | 2021-01-13T00:01:27.343126Z | 2022-04-13T03:04:32.515974Z |
| osv-2018-213 | Use-of-uninitialized-value in gvs_tuple_is_normal | 2021-01-13T00:01:26.534121Z | 2022-04-13T03:04:32.492641Z |
| osv-2018-212 | Heap-buffer-overflow in token_stream_prepare | 2021-01-13T00:01:26.134181Z | 2022-04-13T03:04:32.527743Z |
| osv-2018-161 | Heap-buffer-overflow in BEInt<unsigned short, 2>::set | 2021-01-13T00:01:07.793293Z | 2022-04-13T03:04:32.930471Z |
| osv-2018-150 | Global-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2021-01-13T00:01:04.544450Z | 2022-04-13T03:04:32.880412Z |
| osv-2018-149 | Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int | 2021-01-13T00:01:04.493783Z | 2022-04-13T03:04:32.858815Z |
| osv-2018-129 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2021-01-13T00:00:57.916141Z | 2022-04-13T03:04:32.974311Z |
| osv-2018-127 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2021-01-13T00:00:56.706065Z | 2022-04-13T03:04:32.885786Z |
| osv-2018-126 | UNKNOWN READ in BEInt<int, 4>::operator int | 2021-01-13T00:00:56.326632Z | 2022-04-13T03:04:32.869605Z |
| osv-2018-119 | UNKNOWN READ in AAT::KerxSubTableFormat1<AAT::KerxSubTableHeader>::driver_context_t::transition | 2021-01-13T00:00:54.593710Z | 2022-04-13T03:04:32.875049Z |
| osv-2018-116 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2021-01-13T00:00:53.720581Z | 2022-04-13T03:04:32.990307Z |
| osv-2018-106 | Stack-use-after-return in BEInt<unsigned short, 2>::operator unsigned short | 2021-01-13T00:00:46.804388Z | 2022-04-13T03:04:32.985065Z |
| osv-2022-96 | Heap-buffer-overflow in sequence_compression_api.c | 2022-01-29T00:00:24.594329Z | 2022-04-13T03:04:31.675527Z |
| osv-2022-6 | Heap-buffer-overflow in extract_name | 2022-01-06T00:00:09.667642Z | 2022-04-13T03:04:31.123021Z |
| osv-2022-248 | Uncaught exception in java.base/java.nio.Bits.reserveMemory | 2022-03-16T00:01:40.965144Z | 2022-04-13T03:04:31.580413Z |
| osv-2022-15 | Global-buffer-overflow in ZSTD_compressBlock_opt0 | 2022-01-07T00:00:09.720542Z | 2022-04-13T03:04:31.638184Z |
| osv-2022-145 | Heap-buffer-overflow in print_mac | 2022-02-13T00:01:27.883603Z | 2022-04-13T03:04:31.179893Z |
| osv-2022-12 | Heap-buffer-overflow in print_mac | 2022-01-06T00:02:06.880603Z | 2022-04-13T03:04:31.155422Z |
| osv-2022-110 | Heap-buffer-overflow in ZSTD_compressLiterals | 2022-02-01T00:01:50.971611Z | 2022-04-13T03:04:31.686195Z |
| osv-2022-11 | Heap-buffer-overflow in dhcp_reply | 2022-01-06T00:01:04.470937Z | 2022-04-13T03:04:31.185616Z |
| osv-2022-10 | Heap-buffer-overflow in check_bad_address | 2022-01-06T00:00:44.554417Z | 2022-04-13T03:04:31.191964Z |
| osv-2021-935 | Heap-buffer-overflow in answer_request | 2021-07-09T00:00:11.076648Z | 2022-04-13T03:04:31.129678Z |
| osv-2021-934 | Heap-buffer-overflow in extract_addresses | 2021-07-08T00:01:26.898533Z | 2022-04-13T03:04:31.116826Z |
| osv-2021-933 | Heap-buffer-overflow in print_mac | 2021-07-08T00:01:26.369555Z | 2022-04-13T03:04:31.143462Z |
| osv-2021-932 | Heap-buffer-overflow in resize_packet | 2021-07-08T00:01:25.139349Z | 2022-04-13T03:04:31.204327Z |
| osv-2021-931 | Heap-buffer-overflow in extract_name | 2021-07-08T00:00:46.211999Z | 2022-04-13T03:04:31.173917Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-moodle-2021-20183 | 2024-03-06T11:11:21.883Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-25703 | 2024-03-06T11:11:25.210Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-25702 | 2024-03-06T11:11:28.317Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-25701 | 2024-03-06T11:11:31.978Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-25700 | 2024-03-06T11:11:36.277Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-25699 | 2024-03-06T11:11:40.195Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-25698 | 2024-03-06T11:11:44.111Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-25631 | 2024-03-06T11:11:47.716Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-25630 | 2024-03-06T11:11:51.900Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-25629 | 2024-03-06T11:11:55.590Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-25628 | 2024-03-06T11:11:58.596Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-25627 | 2024-03-06T11:12:01.867Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-1756 | 2024-03-06T11:12:04.986Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-1755 | 2024-03-06T11:12:08.478Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-1754 | 2024-03-06T11:12:11.809Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-1692 | 2024-03-06T11:12:14.814Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-1691 | 2024-03-06T11:12:17.968Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-14322 | 2024-03-06T11:12:21.260Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-14321 | 2024-03-06T11:12:24.622Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-14320 | 2024-03-06T11:12:28.003Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2020-10738 | 2024-03-06T11:12:31.298Z | 2025-04-03T14:40:37.652Z | |
| bit-modsecurity2-2023-38285 | 2024-03-06T10:56:30.263Z | 2025-04-03T14:40:37.652Z | |
| bit-modsecurity2-2023-28882 | 2024-03-06T10:56:39.666Z | 2025-04-03T14:40:37.652Z | |
| bit-modsecurity2-2023-24021 | 2024-03-06T10:56:51.795Z | 2025-04-03T14:40:37.652Z | |
| bit-modsecurity2-2020-15598 | 2024-03-06T10:57:22.693Z | 2025-04-03T14:40:37.652Z | |
| bit-modsecurity-2023-38285 | 2024-03-06T10:56:23.264Z | 2025-04-03T14:40:37.652Z | |
| bit-modsecurity-2023-28882 | 2024-03-06T10:56:32.385Z | 2025-04-03T14:40:37.652Z | |
| bit-modsecurity-2023-24021 | 2024-03-06T10:56:44.073Z | 2025-04-03T14:40:37.652Z | |
| bit-modsecurity-2020-15598 | 2024-03-06T10:57:17.562Z | 2025-04-03T14:40:37.652Z | |
| bit-mod_wsgi-2022-2255 | 2024-03-06T10:56:14.075Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Updated |
|---|---|---|
| var-202105-0617 | A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform… | 2024-02-13T00:00:20.091000Z |
| var-202207-0244 | In CCCI, there is a possible out of bounds write due to a missing bounds check. This coul… | 2024-02-12T23:58:41.643000Z |
| var-202101-1931 | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between seriali… | 2024-02-12T23:58:38.236000Z |
| var-202201-0582 | PJSIP is a free and open source multimedia communication library written in C language im… | 2024-02-12T23:56:53.109000Z |
| var-202204-1222 | Jenkins Subversion Plugin 2.15.3 and earlier does not escape the name and description of … | 2024-02-12T23:54:27.987000Z |
| var-202203-0152 | An issue with app access to camera metadata was addressed with improved logic. This issue… | 2024-02-12T23:43:23.058000Z |
| var-202203-0153 | Description: A permissions issue was addressed with improved validation. This issue is fi… | 2024-02-12T23:38:57.993000Z |
| var-202010-1571 | In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-C… | 2024-02-12T23:37:29.184000Z |
| var-202201-1553 | There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling … | 2024-02-12T23:31:51.191000Z |
| var-202108-2117 | The issue was resolved with additional restrictions on CSS compositing. This issue is fix… | 2024-02-12T23:26:35.818000Z |
| var-202003-0008 | Load value injection in some Intel(R) Processors utilizing speculative execution may allo… | 2024-02-12T23:26:26.482000Z |
| var-202012-1539 | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between seriali… | 2024-02-12T23:22:33.642000Z |
| var-202107-0558 | Cross-site scripting vulnerabilities exist in the telnet_form.php script functionality of… | 2024-02-12T23:21:17.154000Z |
| var-202108-1281 | A logic issue was addressed with improved state management. This issue is fixed in macOS … | 2024-02-12T23:13:58.748000Z |
| var-202105-0488 | There is a denial of service vulnerability in some versions of ManageOne. In specific sce… | 2024-02-12T23:09:24.252000Z |
| var-202207-0621 | A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V7.2),… | 2024-02-12T23:08:54.645000Z |
| var-202204-1223 | A cross-site request forgery (CSRF) vulnerability in Jenkins Subversion Plugin 2.15.3 and… | 2024-02-12T23:06:39.749000Z |
| var-202201-0378 | A permissions issue was addressed with improved validation. This issue is fixed in Securi… | 2024-02-12T23:05:26.590000Z |
| var-202109-1877 | An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a hea… | 2024-02-12T23:02:17.641000Z |
| var-202107-0559 | Cross-site scripting vulnerabilities exist in the ssh_form.php script functionality of Ad… | 2024-02-12T23:01:19.705000Z |
| var-202107-0561 | This vulnerability is present in device_graph_page.php script, which is a part of the Adv… | 2024-02-12T22:58:09.421000Z |
| var-202107-0426 | A vulnerability in the Cisco Adaptive Security Device Manager (ASDM) Launcher could allow… | 2024-02-12T22:53:55.976000Z |
| var-202207-0620 | A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIM… | 2024-02-12T22:53:42.445000Z |
| var-202203-0809 | Liblouis through 3.21.0 has a buffer overflow in compilePassOpcode in compileTranslationT… | 2024-02-12T22:50:44.512000Z |
| var-202207-0622 | A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions < V3.3.46), SIM… | 2024-02-12T22:46:27.582000Z |
| var-202201-0402 | An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply im… | 2024-02-12T22:44:00.851000Z |
| var-202106-1875 | Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by … | 2024-02-12T22:38:25.830000Z |
| var-201907-0769 | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.… | 2024-02-12T22:34:26.362000Z |
| var-202010-1278 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is f… | 2024-02-12T22:33:05.246000Z |
| var-202106-1876 | Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a … | 2024-02-12T22:31:04.852000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20017-1 | Security update for gnutls | 2025-02-03T08:48:38Z | 2025-02-03T08:48:38Z |
| suse-su-2025:20014-1 | Security update for openssl-3, libpulp, ulp-macros | 2025-02-03T08:48:16Z | 2025-02-03T08:48:16Z |
| suse-su-2025:20013-1 | Security update for podman | 2025-02-03T08:47:47Z | 2025-02-03T08:47:47Z |
| suse-su-2025:20012-1 | Security update for libvirt | 2025-02-03T08:47:37Z | 2025-02-03T08:47:37Z |
| suse-su-2025:20011-1 | Security update for qemu | 2025-02-03T08:47:27Z | 2025-02-03T08:47:27Z |
| suse-su-2025:20010-1 | Security update for wget | 2025-02-03T08:47:27Z | 2025-02-03T08:47:27Z |
| suse-su-2025:20009-1 | Security update for openssh | 2025-02-03T08:47:06Z | 2025-02-03T08:47:06Z |
| suse-su-2025:20008-1 | Security update for the Linux Kernel | 2025-02-03T08:47:04Z | 2025-02-03T08:47:04Z |
| suse-su-2025:20007-1 | Security update for less | 2025-02-03T08:47:04Z | 2025-02-03T08:47:04Z |
| suse-su-2025:20003-1 | Security update for util-linux | 2025-02-03T08:46:07Z | 2025-02-03T08:46:07Z |
| suse-su-2025:20002-1 | Security update for nghttp2 | 2025-02-03T08:46:07Z | 2025-02-03T08:46:07Z |
| suse-su-2025:0320-1 | Security update for buildah | 2025-02-01T09:53:55Z | 2025-02-01T09:53:55Z |
| suse-su-2025:0319-1 | Security update for buildah | 2025-02-01T09:53:09Z | 2025-02-01T09:53:09Z |
| suse-su-2025:0318-1 | Security update for ignition | 2025-02-01T03:34:06Z | 2025-02-01T03:34:06Z |
| suse-su-2025:0314-1 | Security update for orc | 2025-01-31T16:03:44Z | 2025-01-31T16:03:44Z |
| suse-su-2025:0313-1 | Security update for apptainer | 2025-01-31T15:03:53Z | 2025-01-31T15:03:53Z |
| suse-su-2025:0310-1 | Security update for python-pydantic | 2025-01-31T12:42:10Z | 2025-01-31T12:42:10Z |
| suse-su-2025:0306-1 | Security update for ignition | 2025-01-31T02:04:08Z | 2025-01-31T02:04:08Z |
| suse-su-2025:0304-1 | Security update for krb5 | 2025-01-30T14:52:21Z | 2025-01-30T14:52:21Z |
| suse-su-2025:0303-1 | Security update for libxml2 | 2025-01-30T14:51:06Z | 2025-01-30T14:51:06Z |
| suse-su-2025:0302-1 | Security update for google-osconfig-agent | 2025-01-30T14:50:36Z | 2025-01-30T14:50:36Z |
| suse-su-2025:0301-1 | Security update for buildah | 2025-01-30T14:50:02Z | 2025-01-30T14:50:02Z |
| suse-su-2025:0300-1 | Security update for libxml2 | 2025-01-30T14:49:48Z | 2025-01-30T14:49:48Z |
| suse-su-2025:0299-1 | Security update for ignition | 2025-01-30T14:33:34Z | 2025-01-30T14:33:34Z |
| suse-su-2025:0297-1 | Security update for govulncheck-vulndb | 2025-01-30T14:03:37Z | 2025-01-30T14:03:37Z |
| suse-su-2025:0295-1 | Security update for ignition | 2025-01-30T09:56:40Z | 2025-01-30T09:56:40Z |
| suse-su-2025:0292-1 | Security update for shadow | 2025-01-29T22:41:56Z | 2025-01-29T22:41:56Z |
| suse-su-2025:0291-1 | Security update for iperf | 2025-01-29T16:11:53Z | 2025-01-29T16:11:53Z |
| suse-su-2025:0290-1 | Security update for hplip | 2025-01-29T16:11:38Z | 2025-01-29T16:11:38Z |
| suse-su-2025:0289-1 | Security update for the Linux Kernel | 2025-01-29T16:11:29Z | 2025-01-29T16:11:29Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-24121 | Hostel Management System empty_rooms.php文件SQL注入漏洞 | 2025-06-27 | 2025-10-16 |
| cnvd-2025-24120 | Hostel Management System /contact_manager.php文件SQL注入漏洞 | 2025-06-27 | 2025-10-16 |
| cnvd-2025-24119 | Hostel Management System contact.php文件SQL注入漏洞 | 2025-06-27 | 2025-10-16 |
| cnvd-2025-24118 | Hostel Management System allocated_rooms.php文件SQL注入漏洞 | 2025-06-27 | 2025-10-16 |
| cnvd-2025-24117 | Hostel Management System hostel_manage.exe文件栈缓冲区溢出漏洞 | 2025-08-20 | 2025-10-16 |
| cnvd-2025-24116 | Hostel Management System hostel_manage.exe文件身份验证不当漏洞 | 2025-08-20 | 2025-10-16 |
| cnvd-2025-24115 | Hostel Management System log_email参数SQL注入漏洞 | 2025-09-25 | 2025-10-16 |
| cnvd-2025-24114 | Hostel Management System login.php文件SQL注入漏洞 | 2025-09-25 | 2025-10-16 |
| cnvd-2025-24113 | Hostel Management System mod_roomtype/index.php文件SQL注入漏洞 | 2025-09-25 | 2025-10-16 |
| cnvd-2025-24112 | Hostel Management System ID参数SQL注入漏洞 | 2025-09-25 | 2025-10-16 |
| cnvd-2025-24111 | Hostel Management System Home参数SQL注入漏洞 | 2025-09-25 | 2025-10-16 |
| cnvd-2025-24110 | Hostel Management System mod_comments/index.php文件SQL注入漏洞 | 2025-09-25 | 2025-10-16 |
| cnvd-2025-24109 | Hostel Management System index.php文件SQL注入漏洞 | 2025-09-25 | 2025-10-16 |
| cnvd-2025-24108 | Simple Food Ordering System order.php文件跨站脚本漏洞 | 2025-09-25 | 2025-10-16 |
| cnvd-2025-24107 | Simple Scheduling System addsubject.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-16 |
| cnvd-2025-24106 | Simple Scheduling System addfaculty.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-16 |
| cnvd-2025-24105 | Simple Scheduling System addcourse.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-16 |
| cnvd-2025-24104 | Simple Scheduling System addroom.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-16 |
| cnvd-2025-24103 | Simple Scheduling System addtime.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-16 |
| cnvd-2025-24102 | Simple Scheduling System add.home.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-16 |
| cnvd-2025-24101 | Hostel Management System mod_users/index.php文件SQL注入漏洞 | 2025-09-29 | 2025-10-16 |
| cnvd-2025-24100 | Simple Food Ordering System product.php文件SQL注入漏洞 | 2025-10-13 | 2025-10-16 |
| cnvd-2025-23989 | Simple Banking System transfermoney.php文件SQL注入漏洞 | 2025-10-13 | 2025-10-16 |
| cnvd-2025-23988 | Simple Banking System removeuser.php文件SQL注入漏洞 | 2025-10-13 | 2025-10-16 |
| cnvd-2025-23987 | Simple Banking System createuser.php文件SQL注入漏洞 | 2025-10-13 | 2025-10-16 |
| cnvd-2025-23986 | Online Hotel Reservation System editpicexec.php文件任意文件上传漏洞 | 2025-10-13 | 2025-10-16 |
| cnvd-2025-23985 | Online Hotel Reservation System addslideexec.php文件任意文件上传漏洞 | 2025-10-13 | 2025-10-16 |
| cnvd-2025-23984 | Online Hotel Reservation System addgalleryexec.php文件任意文件上传漏洞 | 2025-10-13 | 2025-10-16 |
| cnvd-2025-23983 | Online Hotel Reservation System任意文件上传漏洞 | 2025-10-13 | 2025-10-16 |
| cnvd-2025-23982 | Simple Food Ordering System editproduct.php文件SQL注入漏洞 | 2025-10-15 | 2025-10-16 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-0655 | Multiples vulnérabilités dans Google Android | 2024-08-07T00:00:00.000000 | 2024-08-07T00:00:00.000000 |
| CERTFR-2024-AVI-0658 | Multiples vulnérabilités dans Google Chrome | 2024-08-07T00:00:00.000000 | 2024-08-07T00:00:00.000000 |
| CERTFR-2024-AVI-0657 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2024-08-07T00:00:00.000000 | 2024-08-07T00:00:00.000000 |
| CERTFR-2024-AVI-0656 | Multiples vulnérabilités dans les produits Mozilla | 2024-08-07T00:00:00.000000 | 2024-08-07T00:00:00.000000 |
| CERTFR-2024-AVI-0655 | Multiples vulnérabilités dans Google Android | 2024-08-07T00:00:00.000000 | 2024-08-07T00:00:00.000000 |
| certfr-2024-avi-0654 | Vulnérabilité dans Kibana | 2024-08-06T00:00:00.000000 | 2024-08-06T00:00:00.000000 |
| certfr-2024-avi-0653 | Vulnérabilité dans LibreOffice | 2024-08-06T00:00:00.000000 | 2024-08-06T00:00:00.000000 |
| CERTFR-2024-AVI-0654 | Vulnérabilité dans Kibana | 2024-08-06T00:00:00.000000 | 2024-08-06T00:00:00.000000 |
| CERTFR-2024-AVI-0653 | Vulnérabilité dans LibreOffice | 2024-08-06T00:00:00.000000 | 2024-08-06T00:00:00.000000 |
| certfr-2024-avi-0652 | Vulnérabilité dans les produits Cisco | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| certfr-2024-avi-0651 | Vulnérabilité dans les produits Trend Micro | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| certfr-2024-avi-0650 | Multiples vulnérabilités dans Stormshield Management Center | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| certfr-2024-avi-0649 | Vulnérabilité dans les produits Citrix | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| certfr-2024-avi-0648 | Multiples vulnérabilités dans les produits SonicWall | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| certfr-2024-avi-0647 | Multiples vulnérabilités dans Roundcube | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| CERTFR-2024-AVI-0652 | Vulnérabilité dans les produits Cisco | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| CERTFR-2024-AVI-0651 | Vulnérabilité dans les produits Trend Micro | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| CERTFR-2024-AVI-0650 | Multiples vulnérabilités dans Stormshield Management Center | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| CERTFR-2024-AVI-0649 | Vulnérabilité dans les produits Citrix | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| CERTFR-2024-AVI-0648 | Multiples vulnérabilités dans les produits SonicWall | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| CERTFR-2024-AVI-0647 | Multiples vulnérabilités dans Roundcube | 2024-08-05T00:00:00.000000 | 2024-08-05T00:00:00.000000 |
| certfr-2024-avi-0646 | Multiples vulnérabilités dans les produits IBM | 2024-08-02T00:00:00.000000 | 2024-08-02T00:00:00.000000 |
| certfr-2024-avi-0645 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-08-02T00:00:00.000000 | 2024-08-02T00:00:00.000000 |
| certfr-2024-avi-0644 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-08-02T00:00:00.000000 | 2024-08-02T00:00:00.000000 |
| certfr-2024-avi-0643 | Vulnérabilité dans les produits Moxa | 2024-08-02T00:00:00.000000 | 2024-08-02T00:00:00.000000 |
| certfr-2024-avi-0642 | Multiples vulnérabilités dans Microsoft Edge | 2024-08-02T00:00:00.000000 | 2024-08-02T00:00:00.000000 |
| CERTFR-2024-AVI-0646 | Multiples vulnérabilités dans les produits IBM | 2024-08-02T00:00:00.000000 | 2024-08-02T00:00:00.000000 |
| CERTFR-2024-AVI-0645 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-08-02T00:00:00.000000 | 2024-08-02T00:00:00.000000 |
| CERTFR-2024-AVI-0644 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2024-08-02T00:00:00.000000 | 2024-08-02T00:00:00.000000 |
| CERTFR-2024-AVI-0643 | Vulnérabilité dans les produits Moxa | 2024-08-02T00:00:00.000000 | 2024-08-02T00:00:00.000000 |