Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-2jfc-6cc3-69g7 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ghsa-xhj9-wqh5-g6hq | An exposure of sensitive system information to an unauthorized control sphere vulnerability has bee… | 2026-01-02T18:30:31Z | 2026-01-02T18:30:31Z |
| ghsa-xcj3-m9c5-2prq | An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd … | 2026-01-02T18:30:31Z | 2026-01-02T18:30:31Z |
| ghsa-vjhv-9hfj-67mh | A buffer overflow vulnerability has been reported to affect several QNAP operating system versions.… | 2026-01-02T18:30:31Z | 2026-01-02T18:30:31Z |
| ghsa-p5q4-3rv5-j9hj | An SQL injection vulnerability has been reported to affect MARS (Multi-Application Recovery Service… | 2026-01-02T18:30:31Z | 2026-01-02T18:30:31Z |
| ghsa-mp8p-xhgf-rpjv | gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/d… | 2026-01-02T18:30:31Z | 2026-01-02T18:30:31Z |
| ghsa-mgp4-g6w6-2q2x | An external control of file name or path vulnerability has been reported to affect HBS 3 Hybrid Bac… | 2026-01-02T18:30:31Z | 2026-01-02T18:30:31Z |
| ghsa-fxxr-j78f-xmmm | A generation of error message containing sensitive information vulnerability has been reported to a… | 2026-01-02T18:30:31Z | 2026-01-02T18:30:31Z |
| ghsa-ffw7-5h9m-575f | An SQL injection vulnerability has been reported to affect Hyper Data Protector. The remote attacke… | 2026-01-02T18:30:31Z | 2026-01-02T18:30:31Z |
| ghsa-r875-m3xh-7f29 | A path traversal vulnerability has been reported to affect several product versions. If a local att… | 2026-01-02T18:30:30Z | 2026-01-02T18:30:30Z |
| ghsa-jqhp-ccp6-mgpw | A path traversal vulnerability has been reported to affect Qfiling. The remote attackers can then e… | 2026-01-02T18:30:30Z | 2026-01-02T18:30:30Z |
| ghsa-fj3g-cqvg-f3jx | A path traversal vulnerability has been reported to affect several QNAP operating system versions. … | 2026-01-02T18:30:30Z | 2026-01-02T18:30:30Z |
| ghsa-74xj-22j3-mfhw | A path traversal vulnerability has been reported to affect several QNAP operating system versions. … | 2026-01-02T18:30:30Z | 2026-01-02T18:30:30Z |
| ghsa-55qw-5v38-gj45 | A buffer overflow vulnerability has been reported to affect License Center. If a remote attacker ga… | 2026-01-02T18:30:30Z | 2026-01-02T18:30:30Z |
| ghsa-cm78-px7f-5m69 | A buffer overflow vulnerability has been reported to affect several QNAP operating system versions.… | 2026-01-02T18:30:29Z | 2026-01-02T18:30:29Z |
| ghsa-98j3-hjh2-q3pv | An out-of-bounds read vulnerability has been reported to affect License Center. If a remote attacke… | 2026-01-02T18:30:29Z | 2026-01-02T18:30:29Z |
| ghsa-92w4-hf76-4gwf | An improper control of generation of code vulnerability has been reported to affect Malware Remover… | 2026-01-02T18:30:28Z | 2026-01-02T18:30:28Z |
| ghsa-xwhh-qff2-j7fx | A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system … | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-xmww-pq7x-5g2c | An out-of-bounds read vulnerability has been reported to affect several QNAP operating system versi… | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-xj99-2m32-jhvv | An out-of-bounds read vulnerability has been reported to affect several QNAP operating system versi… | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-wmhh-c8hm-26vq | A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system … | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-vj5w-qq78-7xg8 | A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system … | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-qrcf-84cj-mgmg | An allocation of resources without limits or throttling vulnerability has been reported to affect s… | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-qhch-48gg-2f55 | A buffer overflow vulnerability has been reported to affect several QNAP operating system versions.… | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-p666-ch8g-wp7w | A use of externally-controlled format string vulnerability has been reported to affect several QNAP… | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-mwv4-qf7c-vfg5 | A cross-site scripting (XSS) vulnerability has been reported to affect QuMagie. The remote attacker… | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-m9jj-wqc5-fm74 | An out-of-bounds read vulnerability has been reported to affect several QNAP operating system versi… | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-jjfc-5g72-6w7r | SQL injection in gosaliajainam/online-movie-booking 5.5 in movie_details.php allows attackers to ga… | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-fpf9-544w-86x7 | A buffer overflow vulnerability has been reported to affect several QNAP operating system versions.… | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ghsa-57jg-xfph-7vqg | A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system … | 2026-01-02T15:30:31Z | 2026-01-02T15:30:31Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2023-54193 | N/A | net/sched: cls_api: remove block_cb from driver_list b… |
Linux |
Linux |
2025-12-30T12:09:00.738Z | 2025-12-30T12:09:00.738Z |
| cve-2023-54192 | N/A | f2fs: fix null pointer panic in tracepoint in __replac… |
Linux |
Linux |
2025-12-30T12:08:59.989Z | 2025-12-30T12:08:59.989Z |
| cve-2023-54191 | N/A | wifi: mt76: mt7996: fix memory leak in mt7996_mcu_exit |
Linux |
Linux |
2025-12-30T12:08:59.304Z | 2025-12-30T12:08:59.304Z |
| cve-2023-54190 | N/A | leds: led-core: Fix refcount leak in of_led_get() |
Linux |
Linux |
2025-12-30T12:08:58.605Z | 2025-12-30T12:08:58.605Z |
| cve-2023-54189 | N/A | pstore/ram: Add check for kstrdup |
Linux |
Linux |
2025-12-30T12:08:57.915Z | 2025-12-30T12:08:57.915Z |
| cve-2023-54188 | N/A | dmaengine: apple-admac: Fix 'current_tx' not getting freed |
Linux |
Linux |
2025-12-30T12:08:57.226Z | 2025-12-30T12:08:57.226Z |
| cve-2023-54187 | N/A | f2fs: fix potential corruption when moving a directory |
Linux |
Linux |
2025-12-30T12:08:56.562Z | 2025-12-30T12:08:56.562Z |
| cve-2023-54186 | N/A | usb: typec: altmodes/displayport: fix pin_assignment_show |
Linux |
Linux |
2025-12-30T12:08:55.882Z | 2025-12-30T12:08:55.882Z |
| cve-2023-54185 | N/A | btrfs: remove BUG_ON()'s in add_new_free_space() |
Linux |
Linux |
2025-12-30T12:08:55.218Z | 2025-12-30T12:08:55.218Z |
| cve-2023-54184 | N/A | scsi: target: iscsit: Free cmds before session free |
Linux |
Linux |
2025-12-30T12:08:54.528Z | 2025-12-30T12:08:54.528Z |
| cve-2023-54183 | N/A | media: v4l2-core: Fix a potential resource leak in v4l… |
Linux |
Linux |
2025-12-30T12:08:53.888Z | 2025-12-30T12:08:53.888Z |
| cve-2023-54182 | N/A | f2fs: fix to check readonly condition correctly |
Linux |
Linux |
2025-12-30T12:08:53.092Z | 2025-12-30T12:08:53.092Z |
| cve-2023-54181 | N/A | bpf: Fix issue in verifying allow_ptr_leaks |
Linux |
Linux |
2025-12-30T12:08:52.376Z | 2025-12-30T12:08:52.376Z |
| cve-2023-54180 | N/A | btrfs: handle case when repair happens with dev-replace |
Linux |
Linux |
2025-12-30T12:08:51.727Z | 2025-12-30T12:08:51.727Z |
| cve-2023-54179 | N/A | scsi: qla2xxx: Array index may go out of bound |
Linux |
Linux |
2025-12-30T12:08:51.065Z | 2025-12-30T12:08:51.065Z |
| cve-2023-54178 | N/A | of: unittest: fix null pointer dereferencing in of_uni… |
Linux |
Linux |
2025-12-30T12:08:50.324Z | 2025-12-30T12:08:50.324Z |
| cve-2023-54177 | N/A | quota: fix warning in dqgrab() |
Linux |
Linux |
2025-12-30T12:08:49.588Z | 2025-12-30T12:08:49.588Z |
| cve-2023-54176 | N/A | mptcp: stricter state check in mptcp_worker |
Linux |
Linux |
2025-12-30T12:08:48.915Z | 2025-12-30T12:08:48.915Z |
| cve-2023-54175 | N/A | i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path |
Linux |
Linux |
2025-12-30T12:08:48.231Z | 2025-12-30T12:08:48.231Z |
| cve-2023-54174 | N/A | vfio: Fix NULL pointer dereference caused by uninitial… |
Linux |
Linux |
2025-12-30T12:08:47.527Z | 2025-12-30T12:08:47.527Z |
| cve-2023-54173 | N/A | bpf: Disable preemption in bpf_event_output |
Linux |
Linux |
2025-12-30T12:08:46.842Z | 2025-12-30T12:08:46.842Z |
| cve-2023-54172 | N/A | x86/hyperv: Disable IBT when hypercall page lacks ENDB… |
Linux |
Linux |
2025-12-30T12:08:46.146Z | 2025-12-30T12:08:46.146Z |
| cve-2023-54171 | N/A | tracing: Fix memory leak of iter->temp when reading tr… |
Linux |
Linux |
2025-12-30T12:08:45.441Z | 2025-12-30T12:08:45.441Z |
| cve-2023-54170 | N/A | keys: Fix linking a duplicate key to a keyring's assoc_array |
Linux |
Linux |
2025-12-30T12:08:44.763Z | 2025-12-30T12:08:44.763Z |
| cve-2023-54169 | N/A | net/mlx5e: fix memory leak in mlx5e_ptp_open |
Linux |
Linux |
2025-12-30T12:08:44.089Z | 2025-12-30T12:08:44.089Z |
| cve-2023-54168 | N/A | RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() |
Linux |
Linux |
2025-12-30T12:08:43.394Z | 2025-12-30T12:08:43.394Z |
| cve-2023-54167 | N/A | m68k: mm: Move initrd phys_to_virt handling after pagi… |
Linux |
Linux |
2025-12-30T12:08:42.705Z | 2025-12-30T12:08:42.705Z |
| cve-2023-54166 | N/A | igc: Fix Kernel Panic during ndo_tx_timeout callback |
Linux |
Linux |
2025-12-30T12:08:41.832Z | 2025-12-30T12:08:41.832Z |
| cve-2023-54165 | N/A | zsmalloc: move LRU update from zs_map_object() to zs_m… |
Linux |
Linux |
2025-12-30T12:08:41.019Z | 2025-12-30T12:08:41.019Z |
| cve-2023-54164 | N/A | Bluetooth: ISO: fix iso_conn related locking and valid… |
Linux |
Linux |
2025-12-30T12:08:40.357Z | 2025-12-30T12:08:40.357Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-34213 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:59.474Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:59.474Z | |
| cve-2025-34171 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:57.976Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:57.976Z | |
| cve-2025-34170 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:56.482Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:56.482Z | |
| cve-2025-34169 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:54.998Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:54.998Z | |
| cve-2025-34168 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:53.573Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:53.573Z | |
| cve-2025-34167 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:52.104Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:52.104Z | |
| cve-2025-34166 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:50.649Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:50.649Z | |
| cve-2025-34145 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:49.170Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:49.170Z | |
| cve-2025-34144 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:23.066Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:23.066Z | |
| cve-2025-34137 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:46.208Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:46.208Z | |
| cve-2025-34131 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:44.728Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:44.728Z | |
| cve-2025-34122 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:43.311Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:43.311Z | |
| cve-2025-34094 | N/A | {'providerMetadata': {'orgId': '83251b91-4cc7-4094-a5c7-464a1b83ea10', 'shortName': 'VulnCheck', 'dateUpdated': '2026-01-02T16:20:41.794Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.'}]} | N/A | N/A | 2026-01-02T16:20:41.794Z | |
| cve-2025-15439 | Daptin Aggregate API resource_aggregate.go goqu.L sql … |
n/a |
Daptin |
2026-01-02T17:02:07.498Z | 2026-01-02T21:05:16.422Z | |
| cve-2025-9110 | 2.7 (v4.0) | QTS, QuTS hero |
QNAP Systems Inc. |
QTS |
2026-01-02T15:17:29.481Z | 2026-01-02T19:14:42.164Z |
| cve-2025-69284 | In plane.io, a Guest User to a Workspace can still be … |
makeplane |
plane |
2026-01-02T15:42:05.750Z | 2026-01-02T15:42:05.750Z | |
| cve-2025-67269 | N/A | An integer underflow vulnerability exists in the … |
n/a |
n/a |
2026-01-02T00:00:00.000Z | 2026-01-02T15:49:05.691Z |
| cve-2025-67268 | N/A | gpsd before commit dc966aa contains a heap-based … |
n/a |
n/a |
2026-01-02T00:00:00.000Z | 2026-01-02T16:05:18.965Z |
| cve-2025-62852 | 1.2 (v4.0) | QTS, QuTS hero |
QNAP Systems Inc. |
QTS |
2026-01-02T15:19:40.492Z | 2026-01-02T15:19:40.492Z |
| cve-2025-62842 | 7 (v4.0) | HBS 3 Hybrid Backup Sync |
QNAP Systems Inc. |
HBS 3 Hybrid Backup Sync |
2026-01-02T15:51:40.904Z | 2026-01-02T15:51:40.904Z |
| cve-2025-62840 | 7 (v4.0) | HBS 3 Hybrid Backup Sync |
QNAP Systems Inc. |
HBS 3 Hybrid Backup Sync |
2026-01-02T15:51:34.972Z | 2026-01-02T15:51:34.972Z |
| cve-2025-59389 | 8.1 (v4.0) | Hyper Data Protector |
QNAP Systems Inc. |
Hyper Data Protector |
2026-01-02T15:51:48.998Z | 2026-01-02T19:09:42.304Z |
| cve-2025-59387 | 8.1 (v4.0) | MARS (Multi-Application Recovery Service) |
QNAP Systems Inc. |
MARS (Multi-Application Recovery Service) |
2026-01-02T15:19:30.445Z | 2026-01-02T15:19:30.445Z |
| cve-2025-59384 | 8.1 (v4.0) | Qfiling |
QNAP Systems Inc. |
Qfiling |
2026-01-02T15:19:19.626Z | 2026-01-02T15:19:19.626Z |
| cve-2025-59381 | 4.6 (v4.0) | QTS, QuTS hero |
QNAP Systems Inc. |
QTS |
2026-01-02T15:19:09.271Z | 2026-01-02T15:19:09.271Z |
| cve-2025-59380 | 4.6 (v4.0) | QTS, QuTS hero |
QNAP Systems Inc. |
QTS |
2026-01-02T15:18:56.977Z | 2026-01-02T19:10:29.579Z |
| cve-2025-53597 | 1.2 (v4.0) | License Center |
QNAP Systems Inc. |
License Center |
2026-01-02T15:18:41.520Z | 2026-01-02T19:11:27.286Z |
| cve-2025-53594 | 4.4 (v4.0) | Qfinder Pro, Qsync, QVPN |
QNAP Systems Inc. |
Qfinder Pro Mac |
2026-01-02T15:18:26.356Z | 2026-01-02T19:12:02.094Z |
| cve-2025-52871 | 1.3 (v4.0) | License Center |
QNAP Systems Inc. |
License Center |
2026-01-02T15:18:17.036Z | 2026-01-02T19:12:32.718Z |
| cve-2025-48721 | 1.2 (v4.0) | QTS, QuTS hero |
QNAP Systems Inc. |
QTS |
2026-01-02T15:17:38.864Z | 2026-01-02T19:13:09.727Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-0000-ossf-package-analysis-c6ef1fa05f2ae34a | Malicious code in @cheqplease/structured-logger (npm) | 2025-12-11T05:38:58Z | 2025-12-11T05:38:58Z |
| mal-2025-192466 | Malicious code in tnaxmlparserctf (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192465 | Malicious code in tnaparserxml (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:46Z |
| mal-2025-192464 | Malicious code in ofjaaah12 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:45Z |
| mal-2025-192463 | Malicious code in libxmlussr (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192462 | Malicious code in libxmlpupupu (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192461 | Malicious code in libxmljsololos (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192460 | Malicious code in libxmljsololo4 (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192459 | Malicious code in libxmljsololo3 (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192458 | Malicious code in libxmljsololo (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192457 | Malicious code in libxmljs2var234 (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192456 | Malicious code in libxmljs10 (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192455 | Malicious code in libxmlhere (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192454 | Malicious code in libxmlfinal5 (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192453 | Malicious code in libxmlfinal4 (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192452 | Malicious code in libxmlfinal3 (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192451 | Malicious code in libxmlfinal (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| mal-2025-192450 | Malicious code in fadafas3 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T16:25:55Z |
| mal-2025-192449 | Malicious code in elf-stats-sugarplum-mitten-141 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192448 | Malicious code in elf-stats-sparkly-snowglobe-243 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192447 | Malicious code in elf-stats-snowy-toolkit-186 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192446 | Malicious code in elf-stats-silvered-wishlist-243 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192445 | Malicious code in elf-stats-silvered-mailbag-755 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192444 | Malicious code in elf-stats-merry-icicle-449 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192443 | Malicious code in elf-stats-jolly-hammer-980 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192442 | Malicious code in elf-stats-ember-stockpile-448 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192441 | Malicious code in elf-stats-cosy-garland-592 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192440 | Malicious code in elf-stats-candystriped-snowglobe-426 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192439 | Malicious code in asdfgh3 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T16:25:53Z |
| mal-0000-amazon-inspector-f5d1f93ba15e7b1d | Malicious code in libxmljsololo3 (npm) | 2025-12-11T01:47:51Z | 2025-12-11T01:47:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:17128 | Red Hat Security Advisory: Submariner v0.20.2 security fixes and container updates | 2025-10-01T03:46:30+00:00 | 2025-11-21T19:38:43+00:00 |
| rhsa-2025:17124 | Red Hat Security Advisory: kernel security update | 2025-10-01T00:31:42+00:00 | 2025-11-21T19:27:50+00:00 |
| rhsa-2025:17122 | Red Hat Security Advisory: kernel security update | 2025-10-01T00:28:12+00:00 | 2025-11-21T19:27:49+00:00 |
| rhsa-2025:17123 | Red Hat Security Advisory: kernel-rt security update | 2025-10-01T00:24:54+00:00 | 2025-11-21T19:27:53+00:00 |
| rhsa-2025:17119 | Red Hat Security Advisory: perl-JSON-XS security update | 2025-09-30T21:36:52+00:00 | 2025-11-21T19:27:49+00:00 |
| rhsa-2025:17084 | Red Hat Security Advisory: ipa security update | 2025-09-30T17:33:12+00:00 | 2025-11-21T19:27:43+00:00 |
| rhsa-2025:17109 | Red Hat Security Advisory: kernel-rt security update | 2025-09-30T17:24:19+00:00 | 2025-11-21T19:27:47+00:00 |
| rhsa-2025:17088 | Red Hat Security Advisory: ipa security update | 2025-09-30T17:00:56+00:00 | 2025-11-21T19:27:46+00:00 |
| rhsa-2025:17085 | Red Hat Security Advisory: ipa security update | 2025-09-30T16:53:31+00:00 | 2025-11-21T19:27:44+00:00 |
| rhsa-2025:17087 | Red Hat Security Advisory: ipa security update | 2025-09-30T16:43:11+00:00 | 2025-11-21T19:27:46+00:00 |
| rhsa-2025:17086 | Red Hat Security Advisory: ipa security update | 2025-09-30T16:28:08+00:00 | 2025-11-21T19:27:45+00:00 |
| rhsa-2025:17054 | Red Hat Security Advisory: cups security update | 2025-09-30T12:23:26+00:00 | 2025-11-21T19:27:42+00:00 |
| rhsa-2025:17049 | Red Hat Security Advisory: cups security update | 2025-09-30T09:57:46+00:00 | 2025-11-21T19:27:41+00:00 |
| rhsa-2025:17043 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.7.0 release | 2025-09-30T08:54:44+00:00 | 2025-11-21T19:38:42+00:00 |
| rhsa-2025:17009 | Red Hat Security Advisory: kernel security update | 2025-09-30T00:37:36+00:00 | 2025-11-21T19:27:39+00:00 |
| rhsa-2025:17006 | Red Hat Security Advisory: ncurses security update | 2025-09-30T00:33:42+00:00 | 2025-11-21T19:27:39+00:00 |
| rhsa-2025:16989 | Red Hat Security Advisory: Red Hat Offline Knowledge Portal update | 2025-09-29T17:36:18+00:00 | 2025-11-21T19:38:42+00:00 |
| rhsa-2025:16984 | Red Hat Security Advisory: RHOAI 2.19.3 - Red Hat OpenShift AI | 2025-09-29T17:16:20+00:00 | 2025-11-21T19:38:42+00:00 |
| rhsa-2025:16982 | Red Hat Security Advisory: RHOAI 2.22.2 - Red Hat OpenShift AI | 2025-09-29T17:16:15+00:00 | 2025-11-21T19:38:41+00:00 |
| rhsa-2025:16983 | Red Hat Security Advisory: RHOAI 2.21.1 - Red Hat OpenShift AI | 2025-09-29T17:16:12+00:00 | 2025-11-21T19:38:42+00:00 |
| rhsa-2025:16981 | Red Hat Security Advisory: RHOAI 2.16.3 - Red Hat OpenShift AI | 2025-09-29T17:16:06+00:00 | 2025-11-21T19:38:41+00:00 |
| rhsa-2025:16919 | Red Hat Security Advisory: kernel security update | 2025-09-29T12:19:03+00:00 | 2025-11-25T15:42:31+00:00 |
| rhsa-2025:16920 | Red Hat Security Advisory: kernel-rt security update | 2025-09-29T10:24:03+00:00 | 2025-11-25T15:42:28+00:00 |
| rhsa-2025:16918 | Red Hat Security Advisory: RHACS 4.7.7 bug fix and security update | 2025-09-29T08:02:30+00:00 | 2025-11-21T19:38:40+00:00 |
| rhsa-2025:16904 | Red Hat Security Advisory: kernel security update | 2025-09-29T08:02:17+00:00 | 2025-11-25T21:57:22+00:00 |
| rhsa-2025:16880 | Red Hat Security Advisory: kernel security update | 2025-09-29T05:35:08+00:00 | 2025-11-25T21:57:20+00:00 |
| rhsa-2025:16861 | Red Hat Security Advisory: mysql:8.0 security update | 2025-09-29T01:34:13+00:00 | 2025-11-21T19:27:32+00:00 |
| rhsa-2025:16823 | Red Hat Security Advisory: openssh security update | 2025-09-26T01:05:14+00:00 | 2025-11-21T19:27:30+00:00 |
| rhsa-2025:16747 | Red Hat Security Advisory: Red Hat Developer Hub 1.6.5 release. | 2025-09-25T11:13:18+00:00 | 2025-11-21T19:38:40+00:00 |
| rhsa-2025:16159 | Red Hat Security Advisory: OpenShift Container Platform 4.15.58 bug fix and security update | 2025-09-25T09:09:37+00:00 | 2025-11-21T19:26:38+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-39990 | bpf: Check the helper function is valid in get_helper_proto | 2025-10-02T00:00:00.000Z | 2025-12-07T01:38:28.000Z |
| msrc_cve-2025-39988 | can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:43.000Z |
| msrc_cve-2025-39987 | can: hi311x: populate ndo_change_mtu() to prevent buffer overflow | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:55.000Z |
| msrc_cve-2025-39986 | can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow | 2025-10-02T00:00:00.000Z | 2025-10-16T01:03:16.000Z |
| msrc_cve-2025-39985 | can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:37.000Z |
| msrc_cve-2025-39982 | Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync | 2025-10-02T00:00:00.000Z | 2025-10-16T01:03:06.000Z |
| msrc_cve-2025-39981 | Bluetooth: MGMT: Fix possible UAFs | 2025-10-02T00:00:00.000Z | 2025-12-07T01:38:18.000Z |
| msrc_cve-2025-39980 | nexthop: Forbid FDB status change while nexthop is in a group | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:38.000Z |
| msrc_cve-2025-39978 | octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:59.000Z |
| msrc_cve-2025-39977 | futex: Prevent use-after-free during requeue-PI | 2025-10-02T00:00:00.000Z | 2025-10-16T01:03:11.000Z |
| msrc_cve-2025-39973 | i40e: add validation for ring_len param | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:16.000Z |
| msrc_cve-2025-39972 | i40e: fix idx validation in i40e_validate_queue_map | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:53.000Z |
| msrc_cve-2025-39971 | i40e: fix idx validation in config queues msg | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:48.000Z |
| msrc_cve-2025-39970 | i40e: fix input validation logic for action_meta | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:31.000Z |
| msrc_cve-2025-39969 | i40e: fix validation of VF state in get resources | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:04.000Z |
| msrc_cve-2025-39968 | i40e: add max boundary check for VF filters | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:21.000Z |
| msrc_cve-2025-39967 | fbcon: fix integer overflow in fbcon_do_set_font | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:26.000Z |
| msrc_cve-2025-39965 | xfrm: xfrm_alloc_spi shouldn't use 0 as SPI | 2025-10-02T00:00:00.000Z | 2025-10-15T01:01:28.000Z |
| msrc_cve-2025-39964 | crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg | 2025-10-02T00:00:00.000Z | 2025-10-15T01:01:33.000Z |
| msrc_cve-2025-39961 | iommu/amd/pgtbl: Fix possible race while increase page table level | 2025-10-02T00:00:00.000Z | 2025-10-11T01:01:50.000Z |
| msrc_cve-2025-39958 | iommu/s390: Make attach succeed when the device was surprise removed | 2025-10-02T00:00:00.000Z | 2025-10-10T01:02:11.000Z |
| msrc_cve-2025-39957 | wifi: mac80211: increase scan_ies_len for S1G | 2025-10-02T00:00:00.000Z | 2025-10-10T01:02:23.000Z |
| msrc_cve-2025-39955 | tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). | 2025-10-02T00:00:00.000Z | 2025-10-10T01:02:17.000Z |
| msrc_cve-2025-39953 | cgroup: split cgroup_destroy_wq into 3 workqueues | 2025-10-02T00:00:00.000Z | 2025-10-05T01:03:03.000Z |
| msrc_cve-2025-39952 | wifi: wilc1000: avoid buffer overflow in WID string configuration | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:53.000Z |
| msrc_cve-2025-39951 | um: virtio_uml: Fix use-after-free after put_device in probe | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:32.000Z |
| msrc_cve-2025-39949 | qed: Don't collect too many protection override GRC elements | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:48.000Z |
| msrc_cve-2025-39947 | net/mlx5e: Harden uplink netdev access against device unbind | 2025-10-02T00:00:00.000Z | 2025-10-05T01:03:29.000Z |
| msrc_cve-2025-39946 | tls: make sure to abort the stream if headers are bogus | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:22.000Z |
| msrc_cve-2025-39945 | cnic: Fix use-after-free bugs in cnic_delete_task | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:58.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-002451 | Multiple vulnerabilities in SVMPC1 and SVMPC2 | 2022-10-13T17:27+09:00 | 2024-05-30T16:38+09:00 |
| jvndb-2022-000078 | bingo!CMS vulnerable to authentication bypass | 2022-10-11T17:49+09:00 | 2024-05-30T17:57+09:00 |
| jvndb-2022-002448 | Multiple vulnerabilities in Trend Micro Deep Security and Cloud One - Workload Security agents for Windows | 2022-10-11T17:02+09:00 | 2024-06-13T14:30+09:00 |
| jvndb-2022-000077 | The installer of Sony Content Transfer may insecurely load Dynamic Link Libraries | 2022-10-11T15:08+09:00 | 2024-06-12T12:12+09:00 |
| jvndb-2022-000076 | Growi vulnerable to improper access control | 2022-10-07T14:30+09:00 | 2024-06-12T12:04+09:00 |
| jvndb-2022-000075 | IPFire WebUI vulnerable to cross-site scripting | 2022-10-06T13:05+09:00 | 2024-06-12T14:28+09:00 |
| jvndb-2022-002444 | Multiple vulnerabilities in Buffalo network devices | 2022-10-05T17:44+09:00 | 2022-10-13T16:28+09:00 |
| jvndb-2022-002443 | Privilege Escalation Vulnerability in Hitachi Storage Plug-in for VMware vCenter | 2022-10-05T17:28+09:00 | 2022-10-05T17:28+09:00 |
| jvndb-2022-000074 | BookStack vulnerable to cross-site scripting | 2022-09-30T14:48+09:00 | 2024-06-12T14:07+09:00 |
| jvndb-2022-002367 | OpenAM (OpenAM Consortium Edition) vulnerable to open redirect | 2022-09-16T15:30+09:00 | 2024-06-13T11:39+09:00 |
| jvndb-2022-000073 | Multiple vulnerabilities in EC-CUBE | 2022-09-15T16:30+09:00 | 2024-06-13T11:09+09:00 |
| jvndb-2022-000072 | EC-CUBE plugin "Product Image Bulk Upload Plugin" vulnerable to insufficient verification in uploading files | 2022-09-15T16:13+09:00 | 2024-06-13T11:03+09:00 |
| jvndb-2022-000071 | Multiple vulnerabilities in Trend Micro Apex One and Trend Micro Apex One as a Service | 2022-09-14T18:15+09:00 | 2024-06-13T11:34+09:00 |
| jvndb-2022-002364 | DoS Vulnerability in uCosminexus TP1/Client/J and Cosminexus Service Coordinator | 2022-09-14T11:34+09:00 | 2022-09-14T11:34+09:00 |
| jvndb-2022-000070 | Movable Type plugin A-Form vulnerable to cross-site scripting | 2022-09-09T15:01+09:00 | 2024-06-13T13:49+09:00 |
| jvndb-2022-000068 | SYNCK GRAPHICA Mailform Pro CGI vulnerable to information disclosure | 2022-09-05T15:22+09:00 | 2024-06-13T16:00+09:00 |
| jvndb-2022-002346 | Multiple vulnerabilities in Contec FLEXLAN FX3000 and FX2000 series | 2022-09-02T18:08+09:00 | 2022-09-02T18:08+09:00 |
| jvndb-2022-000069 | PowerCMS XMLRPC API vulnerable to command injection | 2022-09-02T15:49+09:00 | 2024-06-13T11:44+09:00 |
| jvndb-2022-000066 | Multiple vulnerabilities in CentreCOM AR260S V2 | 2022-08-29T17:37+09:00 | 2024-06-13T16:21+09:00 |
| jvndb-2022-000067 | Installer of Ricoh Device Software Manager may insecurely load Dynamic Link Libraries | 2022-08-29T15:57+09:00 | 2024-06-13T13:53+09:00 |
| jvndb-2022-000064 | Movable Type XMLRPC API vulnerable to command injection | 2022-08-24T15:58+09:00 | 2024-06-13T18:11+09:00 |
| jvndb-2022-000065 | Multiple vulnerabilities in Exment | 2022-08-24T14:23+09:00 | 2024-06-14T11:09+09:00 |
| jvndb-2022-002339 | Multiple vulnerabilities in PukiWiki | 2022-08-24T14:17+09:00 | 2024-06-14T11:55+09:00 |
| jvndb-2022-002338 | PLANEX MZK-DP150N contains hidden administrative functionality | 2022-08-23T15:02+09:00 | 2024-06-14T14:06+09:00 |
| jvndb-2022-000063 | PukiWiki vulnerable to cross-site scripting | 2022-08-23T14:40+09:00 | 2024-06-14T12:00+09:00 |
| jvndb-2022-002337 | UNIMO Technology digital video recorders vulnerable to missing authentication for critical functions | 2022-08-23T14:31+09:00 | 2024-06-14T10:24+09:00 |
| jvndb-2022-002295 | Multiple vulnerabilities in Trend Micro Security | 2022-08-19T11:42+09:00 | 2022-08-19T11:42+09:00 |
| jvndb-2022-002265 | Trend Micro Endpoint security products for enterprises vulnerable to Link Following Local Privilege Escalation | 2022-08-18T15:45+09:00 | 2024-06-14T17:11+09:00 |
| jvndb-2022-000062 | Kaitai Struct: compiler vulnerable to denial-of-service (DoS) | 2022-08-04T15:14+09:00 | 2022-08-04T15:14+09:00 |
| jvndb-2022-002112 | CONTEC SolarView Compact vulnerable to insufficient verification in uploading files | 2022-08-03T17:40+09:00 | 2024-06-14T15:21+09:00 |
| ID | Description | Updated |
|---|