Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-5q4r-9x8x-8xrp | In the Linux kernel, the following vulnerability has been resolved: btrfs: release path before ino… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-53m3-7xgw-52vj | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix lost destroy smbd co… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-4hqq-5h4g-jhph | In the Linux kernel, the following vulnerability has been resolved: nfsd: move init of percpu repl… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-3v5g-mc4j-7vr8 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fortify the sp… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-2c5w-8p3h-w8f6 | In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential race when … | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-2773-gxc6-qfcf | In the Linux kernel, the following vulnerability has been resolved: net: macb: fix a memory corrup… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-xm68-266p-wmjp | In the Linux kernel, the following vulnerability has been resolved: bpf: Silence a warning in btf_… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-wrx3-9hcj-fp9v | In the Linux kernel, the following vulnerability has been resolved: MIPS: KVM: Fix NULL pointer de… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-qqm3-hrh7-jh6j | In the Linux kernel, the following vulnerability has been resolved: rcuscale: Move rcu_scale_write… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-mwqv-w7x4-3822 | In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: Limit TCA_T… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-jxrr-h72w-8m3v | In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential oops in ci… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:34Z |
| ghsa-jf6q-v9m6-wc7j | In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add check for kmemdu… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-j78v-x2hm-xc58 | In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Add missing gfx11 … | 2025-12-30T15:30:33Z | 2025-12-30T15:30:34Z |
| ghsa-h8wx-9xh3-9g66 | In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Don't leak a resource… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-fjw2-7qv4-gqxh | In the Linux kernel, the following vulnerability has been resolved: btrfs: set page extent mapped … | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-ff8m-hq8v-j76h | In the Linux kernel, the following vulnerability has been resolved: platform/x86: think-lmi: Fix m… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-f39w-x49r-j8p2 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: avoid out of bounds acc… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-cphq-rv4m-x79g | In the Linux kernel, the following vulnerability has been resolved: SUNRPC: double free xprt_ctxt … | 2025-12-30T15:30:33Z | 2025-12-30T15:30:34Z |
| ghsa-97qr-rh7x-rfq4 | In the Linux kernel, the following vulnerability has been resolved: ACPI: EC: Fix oops when removi… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-976x-hvcq-h4hx | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-74c5-8qvv-vrf8 | In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: fi… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-6wgg-jc7h-xjpr | In the Linux kernel, the following vulnerability has been resolved: bus: mhi: ep: Only send -ENOTC… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-5782-r2xr-5rq2 | In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: tx-macro: Fix fo… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-48xp-xhc9-g2gm | In the Linux kernel, the following vulnerability has been resolved: mlx5: fix skb leak while fifo … | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-24q6-h6j8-wpf6 | In the Linux kernel, the following vulnerability has been resolved: block, bfq: Fix division by ze… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:33Z |
| ghsa-xcjh-8fg4-6h7p | In the Linux kernel, the following vulnerability has been resolved: iommufd: Check for uptr overfl… | 2025-12-30T15:30:32Z | 2025-12-30T15:30:33Z |
| ghsa-v7c6-475j-qrqg | In the Linux kernel, the following vulnerability has been resolved: hte: tegra-194: Fix off by one… | 2025-12-30T15:30:32Z | 2025-12-30T15:30:32Z |
| ghsa-r948-fj9p-588x | In the Linux kernel, the following vulnerability has been resolved: net: ipa: only reset hashed ta… | 2025-12-30T15:30:32Z | 2025-12-30T15:30:32Z |
| ghsa-qqxp-4gq8-fjrw | In the Linux kernel, the following vulnerability has been resolved: Revert "IB/isert: Fix incorrec… | 2025-12-30T15:30:32Z | 2025-12-30T15:30:32Z |
| ghsa-q47m-cv74-3xj8 | In the Linux kernel, the following vulnerability has been resolved: regulator: raa215300: Fix reso… | 2025-12-30T15:30:32Z | 2025-12-30T15:30:32Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2023-54256 | N/A | {'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.'}], 'providerMetadata': {'orgId': '416baaa9-dc9f-4396-8d5f-8c081fb06d67', 'shortName': 'Linux', 'dateUpdated': '2025-12-30T14:05:55.844Z'}} | N/A | N/A | 2025-12-30T12:15:51.526Z | 2025-12-30T14:05:55.844Z |
| cve-2023-54255 | N/A | sh: dma: Fix DMA channel offset calculation |
Linux |
Linux |
2025-12-30T12:15:50.822Z | 2025-12-30T12:15:50.822Z |
| cve-2023-54254 | N/A | drm/ttm: Don't leak a resource on eviction error |
Linux |
Linux |
2025-12-30T12:15:50.163Z | 2025-12-30T12:15:50.163Z |
| cve-2023-54253 | N/A | btrfs: set page extent mapped after read_folio in relo… |
Linux |
Linux |
2025-12-30T12:15:49.460Z | 2025-12-30T12:15:49.460Z |
| cve-2023-54252 | N/A | platform/x86: think-lmi: Fix memory leaks when parsing… |
Linux |
Linux |
2025-12-30T12:15:48.796Z | 2025-12-30T12:15:48.796Z |
| cve-2023-54251 | N/A | net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_T… |
Linux |
Linux |
2025-12-30T12:15:48.145Z | 2025-12-30T12:15:48.145Z |
| cve-2023-54250 | N/A | ksmbd: avoid out of bounds access in decode_preauth_ctxt() |
Linux |
Linux |
2025-12-30T12:15:47.467Z | 2025-12-30T12:15:47.467Z |
| cve-2023-54249 | N/A | bus: mhi: ep: Only send -ENOTCONN status if client dri… |
Linux |
Linux |
2025-12-30T12:15:46.798Z | 2025-12-30T12:15:46.798Z |
| cve-2023-54248 | N/A | fs/ntfs3: Add check for kmemdup |
Linux |
Linux |
2025-12-30T12:15:46.091Z | 2025-12-30T12:15:46.091Z |
| cve-2023-54247 | N/A | bpf: Silence a warning in btf_type_id_size() |
Linux |
Linux |
2025-12-30T12:15:45.395Z | 2025-12-30T12:15:45.395Z |
| cve-2023-54246 | N/A | rcuscale: Move rcu_scale_writer() schedule_timeout_uni… |
Linux |
Linux |
2025-12-30T12:15:44.729Z | 2025-12-30T12:15:44.729Z |
| cve-2023-54245 | N/A | ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds |
Linux |
Linux |
2025-12-30T12:15:44.060Z | 2025-12-30T12:15:44.060Z |
| cve-2023-54244 | N/A | ACPI: EC: Fix oops when removing custom query handlers |
Linux |
Linux |
2025-12-30T12:15:43.397Z | 2025-12-30T12:15:43.397Z |
| cve-2022-50873 | N/A | vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove |
Linux |
Linux |
2025-12-30T12:15:42.705Z | 2025-12-30T12:15:42.705Z |
| cve-2022-50872 | N/A | ARM: OMAP2+: Fix memory leak in realtime_counter_init() |
Linux |
Linux |
2025-12-30T12:15:42.035Z | 2025-12-30T12:15:42.035Z |
| cve-2022-50871 | N/A | wifi: ath11k: Fix qmi_msg_handler data structure initi… |
Linux |
Linux |
2025-12-30T12:15:41.372Z | 2025-12-30T12:15:41.372Z |
| cve-2022-50870 | N/A | powerpc/rtas: avoid device tree lookups in rtas_os_term() |
Linux |
Linux |
2025-12-30T12:15:40.718Z | 2025-12-30T12:15:40.718Z |
| cve-2022-50869 | N/A | fs/ntfs3: Fix slab-out-of-bounds in r_page |
Linux |
Linux |
2025-12-30T12:15:39.879Z | 2025-12-30T12:15:39.879Z |
| cve-2022-50868 | N/A | hwrng: amd - Fix PCI device refcount leak |
Linux |
Linux |
2025-12-30T12:15:39.211Z | 2025-12-30T12:15:39.211Z |
| cve-2022-50867 | N/A | drm/msm/a6xx: Fix kvzalloc vs state_kcalloc usage |
Linux |
Linux |
2025-12-30T12:15:38.520Z | 2025-12-30T13:56:57.841Z |
| cve-2022-50866 | N/A | ASoC: pxa: fix null-pointer dereference in filter() |
Linux |
Linux |
2025-12-30T12:15:37.827Z | 2025-12-30T12:15:37.827Z |
| cve-2022-50865 | N/A | tcp: fix a signed-integer-overflow bug in tcp_add_backlog() |
Linux |
Linux |
2025-12-30T12:15:37.150Z | 2025-12-30T12:15:37.150Z |
| cve-2022-50864 | N/A | nilfs2: fix shift-out-of-bounds due to too large expon… |
Linux |
Linux |
2025-12-30T12:15:36.489Z | 2025-12-30T12:15:36.489Z |
| cve-2022-50863 | N/A | wifi: rtw89: free unused skb to prevent memory leak |
Linux |
Linux |
2025-12-30T12:15:35.834Z | 2025-12-30T12:15:35.834Z |
| cve-2022-50862 | N/A | bpf: prevent decl_tag from being referenced in func_proto |
Linux |
Linux |
2025-12-30T12:15:35.177Z | 2025-12-30T12:15:35.177Z |
| cve-2022-50861 | N/A | NFSD: Finish converting the NFSv2 GETACL result encoder |
Linux |
Linux |
2025-12-30T12:15:34.511Z | 2025-12-30T12:15:34.511Z |
| cve-2022-50860 | N/A | apparmor: Fix memleak in alloc_ns() |
Linux |
Linux |
2025-12-30T12:15:33.859Z | 2025-12-30T12:15:33.859Z |
| cve-2022-50859 | N/A | cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO … |
Linux |
Linux |
2025-12-30T12:15:33.198Z | 2025-12-30T12:15:33.198Z |
| cve-2022-50858 | N/A | mmc: alcor: fix return value check of mmc_add_host() |
Linux |
Linux |
2025-12-30T12:15:32.534Z | 2025-12-30T12:15:32.534Z |
| cve-2022-50857 | N/A | rapidio: rio: fix possible name leak in rio_register_mport() |
Linux |
Linux |
2025-12-30T12:15:31.873Z | 2025-12-30T12:15:31.873Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2023-54284 | N/A | media: av7110: prevent underflow in write_ts_to_decoder() |
Linux |
Linux |
2025-12-30T12:23:25.116Z | 2025-12-30T12:23:25.116Z |
| cve-2023-54283 | N/A | bpf: Address KCSAN report on bpf_lru_list |
Linux |
Linux |
2025-12-30T12:23:24.460Z | 2025-12-30T12:23:24.460Z |
| cve-2023-54282 | N/A | media: tuners: qt1010: replace BUG_ON with a regular error |
Linux |
Linux |
2025-12-30T12:23:23.792Z | 2025-12-30T12:23:23.792Z |
| cve-2023-54281 | N/A | btrfs: release path before inode lookup during the ino… |
Linux |
Linux |
2025-12-30T12:23:23.122Z | 2025-12-30T12:23:23.122Z |
| cve-2023-54280 | N/A | cifs: fix potential race when tree connecting ipc |
Linux |
Linux |
2025-12-30T12:23:22.335Z | 2025-12-30T12:23:22.335Z |
| cve-2023-54279 | N/A | MIPS: fw: Allow firmware to pass a empty env |
Linux |
Linux |
2025-12-30T12:16:07.018Z | 2025-12-30T12:16:07.018Z |
| cve-2023-54278 | N/A | s390/vmem: split pages when debug pagealloc is enabled |
Linux |
Linux |
2025-12-30T12:16:06.350Z | 2025-12-30T12:16:06.350Z |
| cve-2023-54277 | N/A | fbdev: udlfb: Fix endpoint check |
Linux |
Linux |
2025-12-30T12:16:05.690Z | 2025-12-30T12:16:05.690Z |
| cve-2023-54276 | N/A | nfsd: move init of percpu reply_cache_stats counters b… |
Linux |
Linux |
2025-12-30T12:16:05.020Z | 2025-12-30T12:16:05.020Z |
| cve-2023-54275 | N/A | wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup |
Linux |
Linux |
2025-12-30T12:16:04.380Z | 2025-12-30T12:16:04.380Z |
| cve-2023-54274 | N/A | RDMA/srpt: Add a check for valid 'mad_agent' pointer |
Linux |
Linux |
2025-12-30T12:16:03.696Z | 2025-12-30T12:16:03.696Z |
| cve-2023-54273 | N/A | xfrm: Fix leak of dev tracker |
Linux |
Linux |
2025-12-30T12:16:02.992Z | 2025-12-30T12:16:02.992Z |
| cve-2023-54272 | N/A | fs/ntfs3: Fix a possible null-pointer dereference in n… |
Linux |
Linux |
2025-12-30T12:16:02.335Z | 2025-12-30T12:16:02.335Z |
| cve-2023-54271 | N/A | blk-cgroup: Fix NULL deref caused by blkg_policy_data … |
Linux |
Linux |
2025-12-30T12:16:01.672Z | 2025-12-30T12:16:01.672Z |
| cve-2023-54270 | N/A | media: usb: siano: Fix use after free bugs caused by d… |
Linux |
Linux |
2025-12-30T12:16:00.990Z | 2025-12-30T12:16:00.990Z |
| cve-2023-54269 | N/A | SUNRPC: double free xprt_ctxt while still in use |
Linux |
Linux |
2025-12-30T12:16:00.317Z | 2025-12-30T12:16:00.317Z |
| cve-2023-54268 | N/A | debugobjects: Don't wake up kswapd from fill_pool() |
Linux |
Linux |
2025-12-30T12:15:59.598Z | 2025-12-30T12:15:59.598Z |
| cve-2023-54267 | N/A | powerpc/pseries: Rework lppaca_shared_proc() to avoid … |
Linux |
Linux |
2025-12-30T12:15:58.914Z | 2025-12-30T12:15:58.914Z |
| cve-2023-54266 | N/A | media: dvb-usb: m920x: Fix a potential memory leak in … |
Linux |
Linux |
2025-12-30T12:15:58.235Z | 2025-12-30T12:15:58.235Z |
| cve-2023-54265 | N/A | ipv6: Fix an uninit variable access bug in __ip6_make_skb() |
Linux |
Linux |
2025-12-30T12:15:57.557Z | 2025-12-30T12:15:57.557Z |
| cve-2023-54264 | N/A | fs/sysv: Null check to prevent null-ptr-deref bug |
Linux |
Linux |
2025-12-30T12:15:56.893Z | 2025-12-30T12:15:56.893Z |
| cve-2023-54263 | N/A | drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP |
Linux |
Linux |
2025-12-30T12:15:56.231Z | 2025-12-30T12:15:56.231Z |
| cve-2023-54262 | N/A | net/mlx5e: Don't clone flow post action attributes sec… |
Linux |
Linux |
2025-12-30T12:15:55.556Z | 2025-12-30T12:15:55.556Z |
| cve-2023-54261 | N/A | drm/amdkfd: Add missing gfx11 MQD manager callbacks |
Linux |
Linux |
2025-12-30T12:15:54.870Z | 2025-12-30T12:15:54.870Z |
| cve-2023-54260 | N/A | cifs: Fix lost destroy smbd connection when MR allocat… |
Linux |
Linux |
2025-12-30T12:15:54.205Z | 2025-12-30T12:15:54.205Z |
| cve-2023-54259 | N/A | soundwire: bus: Fix unbalanced pm_runtime_put() causin… |
Linux |
Linux |
2025-12-30T12:15:53.540Z | 2025-12-30T12:15:53.540Z |
| cve-2023-54258 | N/A | cifs: fix potential oops in cifs_oplock_break |
Linux |
Linux |
2025-12-30T12:15:52.855Z | 2025-12-30T12:15:52.855Z |
| cve-2023-54257 | N/A | net: macb: fix a memory corruption in extended buffer … |
Linux |
Linux |
2025-12-30T12:15:52.186Z | 2025-12-30T12:15:52.186Z |
| cve-2023-54256 | N/A | {'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.'}], 'providerMetadata': {'orgId': '416baaa9-dc9f-4396-8d5f-8c081fb06d67', 'shortName': 'Linux', 'dateUpdated': '2025-12-30T14:05:55.844Z'}} | N/A | N/A | 2025-12-30T12:15:51.526Z | 2025-12-30T14:05:55.844Z |
| cve-2023-54255 | N/A | sh: dma: Fix DMA channel offset calculation |
Linux |
Linux |
2025-12-30T12:15:50.822Z | 2025-12-30T12:15:50.822Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-192650 | Malicious code in viktorparserctf4 (npm) | 2025-12-19T08:40:34Z | 2025-12-22T21:38:14Z |
| mal-2025-192649 | Malicious code in viktorparserctf3 (npm) | 2025-12-19T08:40:34Z | 2025-12-22T21:38:14Z |
| mal-2025-192648 | Malicious code in viktorparserctf2 (npm) | 2025-12-19T08:40:34Z | 2025-12-22T21:38:14Z |
| mal-2025-192647 | Malicious code in viktorparserctf (npm) | 2025-12-19T08:40:34Z | 2025-12-22T21:38:14Z |
| mal-2025-192646 | Malicious code in viktor-xml-parser (npm) | 2025-12-19T08:40:34Z | 2025-12-22T21:38:14Z |
| mal-2025-192638 | Malicious code in qwqwqw (npm) | 2025-12-19T08:40:34Z | 2025-12-22T21:38:13Z |
| mal-2025-192637 | Malicious code in pwnxmljs2 (npm) | 2025-12-19T08:40:34Z | 2025-12-22T21:38:13Z |
| mal-2025-192621 | Malicious code in azaza (npm) | 2025-12-19T08:40:34Z | 2025-12-22T21:38:09Z |
| mal-2025-192643 | Malicious code in test-mal-npm-pkg (npm) | 2025-12-19T08:39:59Z | 2025-12-22T21:38:14Z |
| mal-2025-192619 | Malicious code in adk-github (npm) | 2025-12-19T08:38:03Z | 2025-12-22T21:38:09Z |
| mal-2025-192618 | Malicious code in adk-cli (npm) | 2025-12-19T08:38:03Z | 2025-12-22T21:38:09Z |
| mal-2025-192636 | Malicious code in ppppparserfruit (npm) | 2025-12-19T08:36:38Z | 2025-12-22T21:38:13Z |
| mal-2025-192625 | Malicious code in cursorparserfruit (npm) | 2025-12-19T08:36:38Z | 2025-12-22T21:38:10Z |
| mal-2025-192633 | Malicious code in hubstyletokens (npm) | 2025-12-19T08:36:05Z | 2025-12-22T21:38:11Z |
| mal-2025-192644 | Malicious code in usage-tracker-janus (npm) | 2025-12-19T08:36:04Z | 2025-12-22T21:38:14Z |
| mal-2025-192634 | Malicious code in okta-mfa-library (npm) | 2025-12-19T08:36:04Z | 2025-12-22T21:38:12Z |
| mal-2025-192632 | Malicious code in hubspotter-http (npm) | 2025-12-19T08:36:04Z | 2025-12-22T21:38:11Z |
| mal-2025-192630 | Malicious code in foundations-theming-base (npm) | 2025-12-19T08:36:04Z | 2025-12-22T21:38:11Z |
| mal-2025-192617 | Malicious code in @xyuxu/i18never (npm) | 2025-12-19T08:34:43Z | 2025-12-22T21:38:09Z |
| mal-2025-192631 | Malicious code in graphlink (npm) | 2025-12-19T08:33:18Z | 2025-12-22T21:38:11Z |
| mal-2025-192642 | Malicious code in tailwind-logic (npm) | 2025-12-19T08:32:28Z | 2025-12-22T21:38:14Z |
| mal-2025-192641 | Malicious code in tailwind-color-shine (npm) | 2025-12-19T08:32:28Z | 2025-12-22T21:38:14Z |
| mal-2025-192640 | Malicious code in tailwind-animationbased (npm) | 2025-12-19T08:32:28Z | 2025-12-22T21:38:14Z |
| mal-2025-192627 | Malicious code in elf-stats-sugarplum-fir-770 (npm) | 2025-12-19T08:31:19Z | 2025-12-22T21:38:10Z |
| mal-2025-192624 | Malicious code in chai-nerd (npm) | 2025-12-19T08:29:02Z | 2025-12-22T21:38:10Z |
| mal-2025-192623 | Malicious code in chai-async (npm) | 2025-12-19T08:29:02Z | 2025-12-22T21:38:10Z |
| mal-2025-192620 | Malicious code in android_teminator_x (npm) | 2025-12-19T08:25:42Z | 2025-12-22T21:38:09Z |
| mal-2025-192616 | Malicious code in @pluxee-design-system/core (npm) | 2025-12-19T08:24:02Z | 2025-12-22T21:38:09Z |
| mal-2025-192612 | Malicious code in ctfxmlflgcheck (npm) | 2025-12-19T08:23:47Z | 2025-12-22T21:38:10Z |
| mal-2025-192611 | Malicious code in ctfparsertna (npm) | 2025-12-19T08:23:47Z | 2025-12-22T21:38:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-1431 | Siemens SICAM: Mehrere Schwachstellen | 2023-06-12T22:00:00.000+00:00 | 2025-11-11T23:00:00.000+00:00 |
| wid-sec-w-2023-0780 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-03-27T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-0637 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-03-13T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-0611 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2023-03-09T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-0433 | Apache Commons und Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2023-02-20T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-0328 | Red Hat OpenShift: Mehrere Schwachstellen | 2023-02-09T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-2058 | Grub2: Mehrere Schwachstellen | 2022-11-15T23:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2022-1964 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-11-06T23:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2022-1792 | Linux Kernel: Mehrere Schwachstellen | 2022-10-18T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-1374 | Linux Kernel: Mehrere Schwachstellen | 2022-09-11T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-1186 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-08-24T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-0782 | Apple iOS: Mehrere Schwachstellen | 2022-07-20T22:00:00.000+00:00 | 2025-10-20T22:00:00.000+00:00 |
| wid-sec-w-2022-0778 | Apple macOS: Mehrere Schwachstellen | 2022-07-20T22:00:00.000+00:00 | 2025-10-20T22:00:00.000+00:00 |
| wid-sec-w-2023-0580 | Red Hat Enterprise Linux (mod_auth_openidc): Mehrere Schwachstellen | 2022-05-10T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2022-0969 | Internet Systems Consortium BIND: Mehrere Schwachstellen | 2022-03-16T23:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0499 | expat: Schwachstelle ermöglicht Codeausführung | 2022-01-26T23:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2022-0047 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2021-12-01T23:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2022-1197 | git: Schwachstelle ermöglicht Codeausführung | 2021-05-13T22:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2022-1354 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2021-05-04T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2930 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-07-21T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2548 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2020-03-31T22:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2440 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2015-11-22T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-824231 | SSA-824231: Unauthenticated Firmware Upload Vulnerability in Desigo PX Controllers | 2018-01-24T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-148078 | SSA-148078: Multiple Vulnerabilities in APOGEE/TALON Field Panels | 2017-10-12T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-535640 | SSA-535640: Vulnerability in Industrial Products | 2017-08-30T00:00:00Z | 2022-04-12T00:00:00Z |
| ssa-672373 | SSA-672373: Vulnerabilities in CP 1543-1 before V2.0.28 | 2016-11-18T00:00:00Z | 2022-04-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:18242 | Red Hat Security Advisory: OpenShift Container Platform 4.13.61 security and extras update | 2025-10-23T02:52:48+00:00 | 2025-11-29T06:53:19+00:00 |
| rhsa-2025:18814 | Red Hat Security Advisory: java-1.8.0-openjdk security update | 2025-10-22T22:15:50+00:00 | 2025-11-21T19:29:37+00:00 |
| rhsa-2025:18824 | Red Hat Security Advisory: java-21-openjdk security update | 2025-10-22T20:28:30+00:00 | 2025-11-26T15:07:56+00:00 |
| rhsa-2025:18821 | Red Hat Security Advisory: java-17-openjdk security update | 2025-10-22T20:08:41+00:00 | 2025-11-21T19:29:39+00:00 |
| rhsa-2025:18983 | Red Hat Security Advisory: thunderbird security update | 2025-10-22T19:56:34+00:00 | 2025-11-21T19:29:48+00:00 |
| rhsa-2025:18823 | Red Hat Security Advisory: OpenJDK 17.0.17 Security Update for Windows Builds | 2025-10-22T19:49:16+00:00 | 2025-11-21T19:29:41+00:00 |
| rhsa-2025:18822 | Red Hat Security Advisory: OpenJDK 17.0.17 Security Update for Portable Linux Builds | 2025-10-22T19:48:16+00:00 | 2025-11-21T19:29:43+00:00 |
| rhsa-2025:18825 | Red Hat Security Advisory: OpenJDK 21.0.9 Security Update for Portable Linux Builds | 2025-10-22T19:48:10+00:00 | 2025-11-26T15:07:57+00:00 |
| rhsa-2025:18826 | Red Hat Security Advisory: OpenJDK 21.0.9 Security Update for Windows Builds | 2025-10-22T19:46:43+00:00 | 2025-11-26T15:07:59+00:00 |
| rhsa-2025:18816 | Red Hat Security Advisory: OpenJDK 8u472 Security Update for Portable Linux Builds | 2025-10-22T19:45:52+00:00 | 2025-11-21T19:29:37+00:00 |
| rhsa-2025:18817 | Red Hat Security Advisory: OpenJDK 8u472 Windows Security Update | 2025-10-22T19:45:40+00:00 | 2025-11-21T19:29:42+00:00 |
| rhsa-2025:18984 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2025-10-22T16:41:24+00:00 | 2025-11-24T14:24:12+00:00 |
| rhsa-2025:18989 | Red Hat Security Advisory: RHOAI 2.25.0 - Red Hat OpenShift AI | 2025-10-22T16:01:19+00:00 | 2025-11-21T19:38:50+00:00 |
| rhsa-2025:18979 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2025-10-22T13:21:59+00:00 | 2025-11-27T12:47:14+00:00 |
| rhsa-2025:18217 | Red Hat Security Advisory: OpenShift Container Platform 4.19.17 bug fix and security update | 2025-10-22T06:20:41+00:00 | 2025-11-24T21:04:19+00:00 |
| rhsa-2025:18218 | Red Hat Security Advisory: OpenShift Container Platform 4.17.42 bug fix and security update | 2025-10-22T05:09:35+00:00 | 2025-11-24T21:04:19+00:00 |
| rhsa-2025:18932 | Red Hat Security Advisory: kernel security update | 2025-10-22T00:27:35+00:00 | 2025-11-25T21:27:20+00:00 |
| rhsa-2025:18931 | Red Hat Security Advisory: redis:7 security update | 2025-10-21T23:58:45+00:00 | 2025-11-28T11:32:32+00:00 |
| rhsa-2025:18890 | Red Hat Security Advisory: Red Hat build of Keycloak 26.2.10 Security Update | 2025-10-21T17:13:31+00:00 | 2025-11-21T19:29:46+00:00 |
| rhsa-2025:18889 | Red Hat Security Advisory: Red Hat build of Keycloak 26.2.10 Images Security Update | 2025-10-21T17:09:36+00:00 | 2025-11-21T19:29:46+00:00 |
| rhsa-2025:15397 | Red Hat Security Advisory: OpenShift Container Platform 4.20.0 bug fix and security update | 2025-10-21T14:50:28+00:00 | 2025-11-29T00:08:27+00:00 |
| rhsa-2025:18233 | Red Hat Security Advisory: OpenShift Container Platform 4.19.17 bug fix and security update | 2025-10-21T13:18:19+00:00 | 2025-11-21T19:38:47+00:00 |
| rhsa-2025:18715 | Red Hat Security Advisory: yelp security update from RHEL | 2025-10-21T04:48:16+00:00 | 2025-11-21T19:29:36+00:00 |
| rhsa-2025:18714 | Red Hat Security Advisory: osbuild-composer security update from RHEL | 2025-10-21T04:46:31+00:00 | 2025-11-21T19:29:36+00:00 |
| rhsa-2025:18703 | Red Hat Security Advisory: xterm security update from RHEL | 2025-10-21T04:43:21+00:00 | 2025-11-21T19:29:35+00:00 |
| rhsa-2025:18704 | Red Hat Security Advisory: firefox security update from RHEL | 2025-10-21T04:42:31+00:00 | 2025-11-21T19:29:35+00:00 |
| rhsa-2025:18440 | Red Hat Security Advisory: python3.9 security update from RHEL | 2025-10-21T04:16:36+00:00 | 2025-11-21T19:29:21+00:00 |
| rhsa-2025:18698 | Red Hat Security Advisory: podman security update from RHEL | 2025-10-21T04:16:19+00:00 | 2025-11-21T19:29:35+00:00 |
| rhsa-2025:18695 | Red Hat Security Advisory: gvisor-tap-vsock security update from RHEL | 2025-10-21T04:16:01+00:00 | 2025-11-21T19:29:35+00:00 |
| rhsa-2025:18697 | Red Hat Security Advisory: buildah security update from RHEL | 2025-10-21T04:15:11+00:00 | 2025-11-21T19:29:35+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-54770 | Grub2: use-after-free in net_set_vlan | 2025-11-02T00:00:00.000Z | 2025-11-21T01:03:27.000Z |
| msrc_cve-2025-52881 | runc: LSM labels can be bypassed with malicious config using dummy procfs files | 2025-11-02T00:00:00.000Z | 2025-12-07T01:37:15.000Z |
| msrc_cve-2025-52565 | container escape due to /dev/console mount and related races | 2025-11-02T00:00:00.000Z | 2025-12-02T01:39:36.000Z |
| msrc_cve-2025-47913 | Potential denial of service in golang.org/x/crypto/ssh/agent | 2025-11-02T00:00:00.000Z | 2025-11-25T01:37:18.000Z |
| msrc_cve-2025-40211 | ACPI: video: Fix use-after-free in acpi_video_switch_brightness() | 2025-11-02T00:00:00.000Z | 2025-12-02T14:35:54.000Z |
| msrc_cve-2025-40210 | Revert "NFSD: Remove the cap on number of operations per NFSv4 COMPOUND" | 2025-11-02T00:00:00.000Z | 2025-11-25T01:39:58.000Z |
| msrc_cve-2025-40207 | media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:24.000Z |
| msrc_cve-2025-40206 | netfilter: nft_objref: validate objref and objrefmap expressions | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:17.000Z |
| msrc_cve-2025-40205 | btrfs: avoid potential out-of-bounds in btrfs_encode_fh() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:11.000Z |
| msrc_cve-2025-40204 | sctp: Fix MAC comparison to be constant-time | 2025-11-02T00:00:00.000Z | 2025-12-07T01:35:42.000Z |
| msrc_cve-2025-40202 | ipmi: Rework user message limit handling | 2025-11-02T00:00:00.000Z | 2025-12-07T01:35:54.000Z |
| msrc_cve-2025-40201 | kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:54.000Z |
| msrc_cve-2025-40200 | Squashfs: reject negative file sizes in squashfs_read_inode() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:30.000Z |
| msrc_cve-2025-40198 | ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:18.000Z |
| msrc_cve-2025-40197 | media: mc: Clear minor number before put device | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:22.000Z |
| msrc_cve-2025-40195 | mount: handle NULL values in mnt_ns_release() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:37.000Z |
| msrc_cve-2025-40194 | cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:05.000Z |
| msrc_cve-2025-40193 | xtensa: simdisk: add input size check in proc_write_simdisk | 2025-11-02T00:00:00.000Z | 2025-12-07T01:35:30.000Z |
| msrc_cve-2025-40192 | Revert "ipmi: fix msg stack when IPMI is disconnected" | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:27.000Z |
| msrc_cve-2025-40190 | ext4: guard against EA inode refcount underflow in xattr update | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:00.000Z |
| msrc_cve-2025-40188 | pwm: berlin: Fix wrong register in suspend/resume | 2025-11-02T00:00:00.000Z | 2025-11-25T01:41:17.000Z |
| msrc_cve-2025-40187 | net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:43.000Z |
| msrc_cve-2025-40180 | mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:11.000Z |
| msrc_cve-2025-40179 | ext4: verify orphan file size is not too big | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:03.000Z |
| msrc_cve-2025-40178 | pid: Add a judgment for ns null in pid_nr_ns | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:49.000Z |
| msrc_cve-2025-40176 | tls: wait for pending async decryptions if tls_strp_msg_hold fails | 2025-11-02T00:00:00.000Z | 2025-12-07T01:50:46.000Z |
| msrc_cve-2025-40173 | net/ip6_tunnel: Prevent perpetual tunnel growth | 2025-11-02T00:00:00.000Z | 2025-12-07T01:50:19.000Z |
| msrc_cve-2025-40172 | accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() | 2025-11-02T00:00:00.000Z | 2025-11-13T01:02:30.000Z |
| msrc_cve-2025-40170 | net: use dst_dev_rcu() in sk_setup_caps() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:50:27.000Z |
| msrc_cve-2025-40168 | smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match(). | 2025-11-02T00:00:00.000Z | 2025-12-07T01:50:11.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-000111 | Remarshal unlimitedly expanding YAML alias nodes | 2023-11-10T14:41+09:00 | 2024-05-08T17:53+09:00 |
| jvndb-2023-000107 | EC-CUBE 3 series and 4 series vulnerable to arbitrary code execution | 2023-11-07T13:47+09:00 | 2024-05-09T17:17+09:00 |
| jvndb-2023-004919 | FUJIFILM Business Innovation Corp. and Xerox Corporation MFPs export Address Books with insufficient encryption strength | 2023-11-02T17:21+09:00 | 2024-05-07T15:25+09:00 |
| jvndb-2023-000110 | Improper restriction of XML external entity references (XXE) in e-Tax software | 2023-11-02T13:38+09:00 | 2024-05-01T18:41+09:00 |
| jvndb-2023-004790 | Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2023-11-02T12:14+09:00 | 2023-11-02T12:14+09:00 |
| jvndb-2023-004754 | MCL Technologies MCL-Net vulnerable to directory traversal | 2023-11-01T16:49+09:00 | 2023-11-01T16:49+09:00 |
| jvndb-2023-000109 | Cybozu Remote Service vulnerable to uncontrolled resource consumption | 2023-10-31T13:43+09:00 | 2024-05-07T15:51+09:00 |
| jvndb-2023-000108 | Inkdrop vulnerable to code injection | 2023-10-30T13:48+09:00 | 2024-05-07T16:09+09:00 |
| jvndb-2023-004294 | Advanced Micro Devices Windows kernel drivers vulnerable to insufficient access control on its IOCTL | 2023-10-27T16:10+09:00 | 2024-05-20T17:49+09:00 |
| jvndb-2023-000106 | Multiple vulnerabilities in baserCMS | 2023-10-27T14:46+09:00 | 2024-05-07T15:59+09:00 |
| jvndb-2023-000105 | Movable Type vulnerable to cross-site scripting | 2023-10-25T15:18+09:00 | 2024-05-10T17:47+09:00 |
| jvndb-2023-003956 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON CX-Designer | 2023-10-24T16:11+09:00 | 2024-05-10T17:47+09:00 |
| jvndb-2023-000103 | HP ThinUpdate vulnerable to improper server certificate verification | 2023-10-23T14:26+09:00 | 2023-10-23T14:26+09:00 |
| jvndb-2023-000102 | Multiple vulnerabilities in JustSystems products | 2023-10-19T15:16+09:00 | 2024-05-16T16:44+09:00 |
| jvndb-2023-000104 | Improper restriction of XML external entity references (XXE) in Proself | 2023-10-18T18:00+09:00 | 2024-05-15T17:08+09:00 |
| jvndb-2023-003913 | Multiple vulnerabilities in JTEKT ELECTRONICS OnSinView2 | 2023-10-18T14:13+09:00 | 2024-05-16T17:28+09:00 |
| jvndb-2023-000101 | web2py vulnerable to OS command injection | 2023-10-16T16:11+09:00 | 2024-05-22T17:58+09:00 |
| jvndb-2023-000100 | Scanning evasion issue in Cisco Secure Email Gateway | 2023-10-16T16:11+09:00 | 2023-10-27T15:52+09:00 |
| jvndb-2023-003788 | Out-of-bounds read vulnerability in Keyence KV STUDIO and KV REPLAY VIEWER | 2023-10-11T15:23+09:00 | 2024-05-16T17:09+09:00 |
| jvndb-2023-000098 | e-Gov Client Application fails to restrict custom URL schemes properly | 2023-10-06T14:57+09:00 | 2024-05-17T17:55+09:00 |
| jvndb-2023-003771 | File and Directory Permissions Vulnerability in JP1/Performance Management | 2023-10-04T15:23+09:00 | 2023-10-04T15:23+09:00 |
| jvndb-2023-003770 | DoS Vulnerability in Hitachi Ops Center Common Services | 2023-10-04T15:23+09:00 | 2024-05-22T15:31+09:00 |
| jvndb-2023-003769 | Information Exposure Vulnerability in Hitachi Ops Center Administrator | 2023-10-04T15:23+09:00 | 2024-05-22T15:20+09:00 |
| jvndb-2023-000097 | Citadel WebCit vulnerable to cross-site scripting on Instant Messaging facility | 2023-10-04T14:07+09:00 | 2024-05-21T17:08+09:00 |
| jvndb-2023-003767 | Multiple vulnerabilities in multiple FURUNO SYSTEMS wireless LAN access point devices in ST(Standalone) mode | 2023-10-03T14:26+09:00 | 2024-05-22T18:01+09:00 |
| jvndb-2023-000096 | Improper restriction of XML external entity references (XXE) in FD Application | 2023-10-02T12:36+09:00 | 2024-05-22T15:37+09:00 |
| jvndb-2023-003764 | Multiple vulnerabilities in Panasonic KW Watcher | 2023-09-27T14:44+09:00 | 2023-09-27T14:44+09:00 |
| jvndb-2023-000095 | Shihonkanri Plus vulnerable to relative path traversal | 2023-09-27T13:49+09:00 | 2024-05-21T17:16+09:00 |
| jvndb-2023-003757 | Trend Micro Mobile Security vulnerable to cross-site scripting | 2023-09-26T11:30+09:00 | 2024-03-13T18:07+09:00 |
| jvndb-2023-000094 | Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce" | 2023-09-22T13:51+09:00 | 2024-07-11T16:49+09:00 |
| ID | Description | Updated |
|---|