Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-68896 |
6.5 (3.1)
|
WordPress WDV One Page Docs plugin <= 1.2.4 - Broken A… |
vrpr |
WDV One Page Docs |
2026-01-22T16:52:11.918Z | 2026-01-27T21:25:14.268Z |
| CVE-2025-68898 |
5.8 (3.1)
|
WordPress Synergy Project Manager plugin <= 1.5 - Cros… |
cjjparadoxmax |
Synergy Project Manager |
2026-01-22T16:52:12.134Z | 2026-01-27T21:23:31.362Z |
| CVE-2025-68899 |
8.8 (3.1)
|
WordPress Vivagh theme <= 2.4 - PHP Object Injection v… |
designthemes |
Vivagh |
2026-01-22T16:52:12.326Z | 2026-01-27T21:21:28.891Z |
| CVE-2025-34038 |
8.7 (4.0)
|
Weaver E-cology SQL Injection |
Weaver |
E-cology |
2025-06-24T01:06:35.820Z | 2026-01-27T21:20:55.873Z |
| CVE-2026-1504 |
6.5 (3.1)
|
Inappropriate implementation in Background Fetch … |
Google |
Chrome |
2026-01-27T20:46:35.796Z | 2026-01-27T21:16:21.039Z |
| CVE-2025-68900 |
6.5 (3.1)
|
WordPress Enfold theme <= 7.1.3 - Cross Site Scripting… |
Kriesi |
Enfold |
2026-01-22T16:52:12.531Z | 2026-01-27T21:03:12.668Z |
| CVE-2025-68901 |
8.6 (3.1)
|
WordPress Anona theme <= 8.0 - Arbitrary File Deletion… |
AivahThemes |
Anona |
2026-01-22T16:52:12.738Z | 2026-01-27T21:03:02.187Z |
| CVE-2025-68902 |
7.3 (3.1)
|
WordPress Anona theme <= 8.0 - Arbitrary File Download… |
AivahThemes |
Anona |
2026-01-22T16:52:12.937Z | 2026-01-27T21:02:00.466Z |
| CVE-2025-68903 |
8.8 (3.1)
|
WordPress Anona theme <= 8.0 - PHP Object Injection vu… |
AivahThemes |
Anona |
2026-01-22T16:52:13.150Z | 2026-01-27T21:00:55.783Z |
| CVE-2025-68905 |
7.5 (3.1)
|
WordPress JNews - Pay Writer plugin <= 11.0.0 - Local … |
jegtheme |
JNews - Pay Writer |
2026-01-22T16:52:13.550Z | 2026-01-27T20:59:32.092Z |
| CVE-2025-68858 |
7.1 (3.1)
|
WordPress wpCAS plugin <= 1.07 - Cross Site Scripting … |
Casey Bisson |
wpCAS |
2026-01-22T16:52:09.772Z | 2026-01-27T20:58:21.978Z |
| CVE-2025-68907 |
7.5 (3.1)
|
WordPress Hostme v2 theme <= 7.0 - Arbitrary File Dele… |
AivahThemes |
Hostme v2 |
2026-01-22T16:52:13.949Z | 2026-01-27T20:57:37.883Z |
| CVE-2025-68908 |
8.1 (3.1)
|
WordPress Barberry theme <= 2.9.9.87 - Local File Incl… |
temash |
Barberry |
2026-01-22T16:52:14.157Z | 2026-01-27T20:57:29.543Z |
| CVE-2026-24480 |
8.7 (4.0)
|
QGIS had validated RCE and Repository Takeover via Git… |
qgis |
QGIS |
2026-01-27T00:32:04.725Z | 2026-01-27T20:54:42.308Z |
| CVE-2025-68881 |
8.5 (3.1)
|
WordPress AppExperts plugin <= 1.4.5 - SQL Injection v… |
Saad Iqbal |
AppExperts |
2026-01-22T16:52:10.921Z | 2026-01-27T20:53:59.630Z |
| CVE-2026-1472 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:26:46.297Z | 2026-01-27T20:53:03.491Z |
| CVE-2026-1473 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:27:26.475Z | 2026-01-27T20:52:49.184Z |
| CVE-2026-1474 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:27:58.383Z | 2026-01-27T20:52:37.150Z |
| CVE-2026-1475 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:28:31.574Z | 2026-01-27T20:52:26.632Z |
| CVE-2026-24623 |
6.5 (3.1)
|
WordPress Neoforum plugin <= 1.0 - Reflected Cross Sit… |
saeros1984 |
Neoforum |
2026-01-23T14:29:07.026Z | 2026-01-27T20:52:22.218Z |
| CVE-2026-1476 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:29:18.270Z | 2026-01-27T20:52:18.549Z |
| CVE-2026-1477 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:30:04.356Z | 2026-01-27T20:52:11.854Z |
| CVE-2026-24472 |
5.3 (3.1)
|
Hono cache middleware ignores "Cache-Control: private"… |
honojs |
hono |
2026-01-27T19:34:33.065Z | 2026-01-27T20:52:05.494Z |
| CVE-2026-24473 |
6.3 (4.0)
|
Hono has an Arbitrary Key Read in Serve static Middlew… |
honojs |
hono |
2026-01-27T19:37:52.012Z | 2026-01-27T20:51:59.157Z |
| CVE-2026-24771 |
4.7 (3.1)
|
Hono has a Cross-site Scripting vulnerability |
honojs |
hono |
2026-01-27T19:41:33.773Z | 2026-01-27T20:51:54.145Z |
| CVE-2026-24688 |
5.1 (4.0)
|
pypdf has possible Infinite Loop when processing outli… |
py-pdf |
pypdf |
2026-01-27T19:44:06.173Z | 2026-01-27T20:51:48.030Z |
| CVE-2025-12810 |
5.3 (4.0)
|
Failure in Password Rotation and Check-in Mechanism in… |
Delinea Inc. |
Secret Server On-Prem |
2026-01-27T19:46:04.677Z | 2026-01-27T20:51:42.590Z |
| CVE-2025-14988 |
10 (4.0)
|
Incorrect Permission Assignment for Critical Resource … |
iba Systems |
ibaPDA |
2026-01-27T20:08:54.853Z | 2026-01-27T20:51:36.885Z |
| CVE-2026-24486 |
8.6 (3.1)
|
Python-Multipart has Arbitrary File Write via Non-Defa… |
Kludex |
python-multipart |
2026-01-27T00:34:06.229Z | 2026-01-27T20:51:06.407Z |
| CVE-2026-24528 |
6.5 (3.1)
|
WordPress Nova Blocks plugin <= 2.1.9 - Cross Site Scr… |
pixelgrade |
Nova Blocks |
2026-01-23T14:28:49.493Z | 2026-01-27T20:50:48.928Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2020-36974 |
8.5 (4.0)
7.8 (3.1)
|
Realtek Andrea RT Filters 1.0.64.7 - 'AERTSr64.EXE' Un… |
Realtek |
Realtek Andrea RT Filters |
2026-01-27T18:51:01.383Z | 2026-01-29T16:49:16.065Z |
| CVE-2025-39490 |
8.1 (3.1)
|
WordPress Backpack Traveler <= 2.7 - Local File Inclus… |
Mikado-Themes |
Backpack Traveler |
2025-05-23T12:43:54.481Z | 2025-05-23T13:24:17.888Z |
| CVE-2015-10145 |
8.7 (4.0)
|
Gargoyle 1.5.x Authenticated OS Command Execution via … |
Gargoyle |
Gargoyle Router Management Utility |
2025-12-31T20:48:11.986Z | 2026-01-02T14:36:00.930Z |
| CVE-2025-15223 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Philipinho Simple-PHP-Blog login.php cross site scripting |
Philipinho |
Simple-PHP-Blog |
2025-12-31T02:32:09.788Z | 2026-01-02T14:37:44.183Z |
| CVE-2025-69092 |
6.5 (3.1)
|
WordPress Essential Addons for Elementor plugin <= 6.5… |
WPDeveloper |
Essential Addons for Elementor |
2025-12-30T10:47:58.488Z | 2026-01-20T14:28:29.757Z |
| CVE-2025-69034 |
8.1 (3.1)
|
WordPress Lekker theme <= 1.8 - Local File Inclusion v… |
Mikado-Themes |
Lekker |
2025-12-30T10:47:57.680Z | 2026-01-20T14:28:29.626Z |
| CVE-2026-24910 |
5.9 (3.1)
|
In Bun before 1.3.5, the default trusted dependen… |
Bun |
Bun |
2026-01-27T22:26:26.801Z | 2026-01-28T21:19:54.515Z |
| CVE-2026-24909 |
5.9 (3.1)
|
vlt before 1.0.0-rc.10 mishandles path sanitizati… |
vlt |
vlt |
2026-01-27T22:14:37.716Z | 2026-01-28T21:18:16.797Z |
| CVE-2026-24883 |
3.7 (3.1)
|
In GnuPG before 2.5.17, a long signature packet l… |
GnuPG |
GnuPG |
2026-01-27T18:43:18.883Z | 2026-01-28T15:52:11.076Z |
| CVE-2026-24882 |
8.4 (3.1)
|
In GnuPG before 2.5.17, a stack-based buffer over… |
GnuPG |
GnuPG |
2026-01-27T18:40:18.166Z | 2026-01-28T15:45:56.231Z |
| CVE-2026-24881 |
8.1 (3.1)
|
In GnuPG before 2.5.17, a crafted CMS (S/MIME) En… |
GnuPG |
GnuPG |
2026-01-27T18:36:56.727Z | 2026-01-27T20:08:54.449Z |
| CVE-2026-24875 |
7.8 (3.1)
|
Integer overflow in modizer |
yoyofr |
modizer |
2026-01-27T15:55:48.365Z | 2026-01-27T21:34:47.119Z |
| CVE-2026-24874 |
9.1 (3.1)
|
Type confusion in xray-monolith |
themrdemonized |
xray-monolith |
2026-01-27T15:55:03.021Z | 2026-01-27T16:48:38.430Z |
| CVE-2026-24873 |
7.8 (3.1)
|
Out-of-bounds read in lpp-vita |
Rinnegatamante |
lpp-vita |
2026-01-27T15:53:20.942Z | 2026-01-27T17:00:59.576Z |
| CVE-2026-24872 |
9.8 (3.1)
|
Pointer arithmetic error in SkyFire_548 |
ProjectSkyfire |
SkyFire_548 |
2026-01-27T15:51:45.395Z | 2026-01-27T15:51:45.395Z |
| CVE-2026-24871 |
10 (4.0)
|
Code injection in Minecraft-Rcon-Manage |
pilgrimage233 |
Minecraft-Rcon-Manage |
2026-01-27T15:50:52.952Z | 2026-01-27T21:34:59.144Z |
| CVE-2026-24870 |
3.7 (3.1)
|
Information disclosure in ixray-1.6-stcop |
ixray-team |
ixray-1.6-stcop |
2026-01-27T15:47:13.401Z | 2026-01-27T21:35:14.884Z |
| CVE-2026-24850 |
5.3 (3.1)
|
ML-DSA Signature Verification Accepts Signatures with … |
RustCrypto |
signatures |
2026-01-28T00:24:53.146Z | 2026-01-28T14:54:22.827Z |
| CVE-2026-24841 |
9.9 (3.1)
|
Dokploy Vulnerable to Authenticated Remote Code Execut… |
Dokploy |
dokploy |
2026-01-28T00:18:23.724Z | 2026-01-28T14:59:11.561Z |
| CVE-2026-24840 |
8 (3.1)
|
Dokploy uses hardcoded credentials in installation scr… |
Dokploy |
dokploy |
2026-01-28T00:15:57.299Z | 2026-01-28T15:01:06.280Z |
| CVE-2026-24839 |
4.7 (3.1)
|
Dokploy has a clickjacking vulnerability - Missing X-F… |
Dokploy |
dokploy |
2026-01-28T00:01:49.253Z | 2026-01-28T15:02:29.344Z |
| CVE-2026-24838 |
9.1 (3.1)
|
DotNetNuke.Core Vulnerable to Stored XSS via Module Title |
dnnsoftware |
Dnn.Platform |
2026-01-27T23:58:33.340Z | 2026-01-28T15:03:27.676Z |
| CVE-2026-24837 |
7.7 (3.1)
|
DotNetNuke.Core Vulnerable to Stored XSS in Module Del… |
dnnsoftware |
Dnn.Platform |
2026-01-27T23:53:23.875Z | 2026-01-28T21:03:06.368Z |
| CVE-2026-24836 |
7.7 (3.1)
|
DotNetNuke.Core Vulnerable to Stored XSS in Scheduler … |
dnnsoftware |
Dnn.Platform |
2026-01-27T23:51:27.138Z | 2026-01-28T21:04:11.758Z |
| CVE-2026-24833 |
7.7 (3.1)
|
DotNetNuke.Core Vulnerable to Stored XSS in Module Des… |
dnnsoftware |
Dnn.Platform |
2026-01-27T23:49:25.084Z | 2026-01-28T21:05:02.861Z |
| CVE-2026-24832 |
9.8 (3.1)
|
Out-of-bounds write in ixray-1.6-stcop |
ixray-team |
ixray-1.6-stcop |
2026-01-27T15:43:52.586Z | 2026-01-27T21:35:28.495Z |
| CVE-2026-24831 |
7.5 (3.1)
|
Infinite loop (DoS) in ixray-1.6-stcop |
ixray-team |
ixray-1.6-stcop |
2026-01-27T15:40:51.479Z | 2026-01-27T21:35:42.573Z |
| CVE-2026-24785 |
8 (4.0)
|
Clatter has a PSK Validity Rule Violation issue |
jmlepisto |
clatter |
2026-01-27T23:38:53.409Z | 2026-01-28T15:10:48.864Z |
| CVE-2026-24784 |
6.8 (3.1)
|
DotNetNuke.Core has a potential XSS vulnerability in m… |
dnnsoftware |
Dnn.Platform |
2026-01-27T23:47:41.846Z | 2026-01-28T15:06:44.527Z |
| CVE-2026-24783 |
7.5 (3.1)
|
soroban-fixed-point-math has Incorrect Rounding and Ov… |
script3 |
soroban-fixed-point-math |
2026-01-27T22:04:18.006Z | 2026-01-28T21:09:12.428Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-39490 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-05-23T13:15:30.903 | 2026-01-29T16:59:35.630 |
| fkie_cve-2015-10145 | Gargoyle router management utility versions 1.5.x contain an authenticated OS command execution vul… | 2025-12-31T21:15:50.920 | 2026-01-29T16:53:56.950 |
| fkie_cve-2025-15223 | A vulnerability was found in Philipinho Simple-PHP-Blog up to 94b5d3e57308bce5dfbc44c3edafa9811893d… | 2025-12-31T03:15:53.610 | 2026-01-29T16:50:54.027 |
| fkie_cve-2025-69092 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-30T11:16:02.567 | 2026-01-29T16:48:22.370 |
| fkie_cve-2025-69034 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-30T11:16:02.063 | 2026-01-29T16:47:39.080 |
| fkie_cve-2026-24910 | In Bun before 1.3.5, the default trusted dependencies list (aka trust allow list) can be spoofed by… | 2026-01-27T23:15:50.860 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24909 | vlt before 1.0.0-rc.10 mishandles path sanitization for tar, leading to path traversal during extraction. | 2026-01-27T23:15:50.680 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24883 | In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success wit… | 2026-01-27T19:16:16.823 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24882 | In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the P… | 2026-01-27T19:16:16.670 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24881 | In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped … | 2026-01-27T19:16:16.517 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24875 | Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affects modizer: before 4.1.1. | 2026-01-27T16:16:37.013 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24874 | Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-… | 2026-01-27T16:16:36.880 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24873 | Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects lpp-vita: before lpp… | 2026-01-27T16:16:36.753 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24872 | improper pointer arithmetic vulnerability in ProjectSkyfire SkyFire_548.This issue affects SkyFir… | 2026-01-27T16:16:36.640 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24871 | Improper Control of Generation of Code ('Code Injection') vulnerability in pilgrimage233 Minecraft-… | 2026-01-27T16:16:36.507 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24870 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ixray-team ixray-1.6-st… | 2026-01-27T16:16:36.377 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24850 | The ML-DSA crate is a Rust implementation of the Module-Lattice-Based Digital Signature Standard (M… | 2026-01-28T01:16:15.097 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24841 | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a criti… | 2026-01-28T01:16:14.797 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24840 | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardc… | 2026-01-28T01:16:14.647 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24839 | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, the Dok… | 2026-01-28T01:16:14.490 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24838 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft … | 2026-01-28T01:16:14.350 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24837 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft … | 2026-01-28T00:15:51.050 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24836 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft … | 2026-01-28T00:15:50.910 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24833 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft … | 2026-01-28T00:15:50.773 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24832 | Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop:… | 2026-01-27T16:16:36.033 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24831 | Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.… | 2026-01-27T16:16:35.903 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24785 | Clatter is a no_std compatible, pure Rust implementation of the Noise protocol framework with post-… | 2026-01-28T00:15:50.623 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24784 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft … | 2026-01-28T00:15:50.480 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24783 | soroban-fixed-point-math is a fixed-point math library for Soroban smart contacts. In versions 1.3.… | 2026-01-27T22:15:57.433 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24771 | Hono is a Web application framework that provides support for any JavaScript runtime. Prior to vers… | 2026-01-27T20:16:24.337 | 2026-01-29T16:31:35.700 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-35j2-xmwj-f25h |
9.8 (3.1)
|
Missing Authorization vulnerability in FmeAddons Registration & Login with Mobile Phone Number for … | 2026-01-22T18:30:37Z | 2026-01-27T18:32:11Z |
| ghsa-292q-3p6w-47gj |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-22T18:30:37Z | 2026-01-27T18:32:11Z |
| ghsa-3xhw-hf92-cgv2 |
10.0 (3.1)
|
Multiple SQL injection vulnerabilitites in ycf1998 money-pos system before commit 11f276bd20a41f089… | 2025-11-07T18:30:30Z | 2026-01-27T18:32:08Z |
| ghsa-2889-4jg5-2f75 |
5.3 (3.1)
|
If a user tries to login but the provided credentials are incorrect a log is created. The data for … | 2025-10-06T09:30:19Z | 2026-01-27T18:32:07Z |
| ghsa-mqj8-8wq6-rg29 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: Fix return … | 2025-10-04T18:31:13Z | 2026-01-27T18:32:06Z |
| ghsa-5xpc-qj79-9qw9 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/mipi-dsi: Detach devices w… | 2025-10-04T18:31:13Z | 2026-01-27T18:32:06Z |
| ghsa-49r4-jvjj-q7x6 |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab… | 2025-10-04T18:31:14Z | 2026-01-27T18:32:06Z |
| ghsa-24j6-88m8-2wx3 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: coresight: cti: Fix hang in ct… | 2025-10-04T18:31:14Z | 2026-01-27T18:32:06Z |
| ghsa-x37q-qw63-qf28 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mm/kmemleak: avoid soft lockup… | 2025-09-11T18:35:50Z | 2026-01-27T18:32:05Z |
| ghsa-vwf8-rq93-5m8v |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hfs: fix slab-out-of-bounds in… | 2025-09-05T18:31:17Z | 2026-01-27T18:32:05Z |
| ghsa-v2pf-75pf-9c5h |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-leng… | 2025-09-05T18:31:26Z | 2026-01-27T18:32:05Z |
| ghsa-ph27-9pw7-jv35 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: qed: Don't collect too many pr… | 2025-10-04T09:30:21Z | 2026-01-27T18:32:05Z |
| ghsa-mhw2-58jv-2mcg |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mt76: mt7921: fix kernel panic… | 2025-09-15T15:31:29Z | 2026-01-27T18:32:05Z |
| ghsa-f84m-84r4-h992 |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bound… | 2025-09-05T18:31:17Z | 2026-01-27T18:32:05Z |
| ghsa-96vc-hjj8-mp82 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't use BUG_ON() in… | 2025-09-05T18:31:17Z | 2026-01-27T18:32:05Z |
| ghsa-88m5-rfvg-rhq2 |
4.6 (3.1)
|
Some Honor products are affected by type confusion vulnerability, successful exploitation could cau… | 2023-12-29T06:30:29Z | 2026-01-27T18:32:05Z |
| ghsa-7gg4-pr88-8256 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ext4: add EXT4_IGET_BAD flag t… | 2025-10-04T18:31:13Z | 2026-01-27T18:32:05Z |
| ghsa-5jqr-8vwq-w36c |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drbd: add missing kref_get in … | 2025-09-05T18:31:16Z | 2026-01-27T18:32:05Z |
| ghsa-3rrf-jrxv-9vpm |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: iio: light: as73211: Ensure bu… | 2025-09-05T18:31:26Z | 2026-01-27T18:32:05Z |
| ghsa-v4xf-p739-569h |
4.0 (3.1)
|
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploi… | 2023-12-29T03:30:29Z | 2026-01-27T18:32:04Z |
| ghsa-phgv-cmcv-w837 |
4.0 (3.1)
|
Some Honor products are affected by signature management vulnerability, successful exploitation cou… | 2023-12-29T03:30:28Z | 2026-01-27T18:32:04Z |
| ghsa-mh75-hrg8-8qhx |
3.3 (3.1)
|
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploi… | 2023-12-29T03:30:29Z | 2026-01-27T18:32:04Z |
| ghsa-fpr5-pmwh-c27h |
4.0 (3.1)
|
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploi… | 2023-12-29T03:30:29Z | 2026-01-27T18:32:04Z |
| ghsa-6x7c-m4cm-f7rp |
7.3 (3.1)
|
Some Honor products are affected by signature management vulnerability, successful exploitation cou… | 2023-12-29T03:30:29Z | 2026-01-27T18:32:04Z |
| ghsa-9m4g-m3p5-p6gm |
5.4 (3.1)
|
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implemen… | 2026-01-27T15:30:32Z | 2026-01-27T15:30:32Z |
| ghsa-xc99-2v4m-jv2w |
2.8 (3.1)
|
A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs b… | 2026-01-27T15:30:31Z | 2026-01-27T15:30:31Z |
| ghsa-r2rp-r5cj-6c6x |
4.2 (3.1)
|
A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to … | 2026-01-27T15:30:31Z | 2026-01-27T15:30:31Z |
| ghsa-499f-rpfh-94vx |
6.5 (3.1)
|
In ConnectWise PSA versions older than 2026.1, certain session cookies were not set with the HttpOn… | 2026-01-16T15:31:25Z | 2026-01-27T15:30:27Z |
| ghsa-vgvm-wwrq-c4xw |
5.4 (3.1)
|
An authenticated attacker granted a Viewer or Auditor role on a BIG-IQ can upload arbitrary files u… | 2023-07-06T21:14:53Z | 2026-01-27T15:30:26Z |
| ghsa-gpp2-hwq5-2xp4 |
8.7 (3.1)
|
In ConnectWise PSA versions older than 2026.1, Time Entry notes stored in the Time Entry Audit Trai… | 2026-01-16T15:31:25Z | 2026-01-27T15:30:26Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-603 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-13T00:15:00Z | 2021-12-09T06:35:06.680335Z |
| pysec-2021-602 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.599796Z |
| pysec-2021-601 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.517637Z |
| pysec-2021-600 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.437026Z |
| pysec-2021-599 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.351462Z |
| pysec-2021-598 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.268797Z |
| pysec-2021-597 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.188810Z |
| pysec-2021-596 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.073182Z |
| pysec-2021-595 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.976648Z |
| pysec-2021-594 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.896757Z |
| pysec-2021-593 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.816233Z |
| pysec-2021-592 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.737030Z |
| pysec-2021-591 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.654112Z |
| pysec-2021-590 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.572307Z |
| pysec-2021-589 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.480275Z |
| pysec-2021-588 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.402350Z |
| pysec-2021-587 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.322708Z |
| pysec-2021-586 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.237190Z |
| pysec-2021-585 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.144273Z |
| pysec-2021-584 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.048687Z |
| pysec-2021-583 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.970183Z |
| pysec-2021-582 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.885089Z |
| pysec-2021-581 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.799643Z |
| pysec-2021-580 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:04.699565Z |
| pysec-2021-579 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:04.618744Z |
| pysec-2021-578 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.523711Z |
| pysec-2021-577 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.439609Z |
| pysec-2021-576 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.358938Z |
| pysec-2021-575 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.272005Z |
| pysec-2021-574 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.173783Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32637 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.746922Z |
| gsd-2024-32636 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.734385Z |
| gsd-2024-32635 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.875136Z |
| gsd-2024-32634 | In huge memory get unmapped area check, code can never be reached because of a logical co… | 2024-04-17T05:01:56.786326Z |
| gsd-2024-32633 | An unsigned value can never be negative, so eMMC full disk test will always evaluate the … | 2024-04-17T05:01:56.911843Z |
| gsd-2024-32632 | A value in ATCMD will be misinterpreted by printf, causing incorrect output and possibly … | 2024-04-17T05:01:56.874071Z |
| gsd-2024-32631 | Out-of-Bounds read in ciCCIOTOPT in ASR180X will cause incorrect computations. | 2024-04-17T05:01:56.850009Z |
| gsd-2024-32630 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.788485Z |
| gsd-2024-32629 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.745948Z |
| gsd-2024-32628 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.921845Z |
| gsd-2024-32627 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.790643Z |
| gsd-2024-32626 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.745742Z |
| gsd-2024-32625 | In OffloadAMRWriter, a scalar field is not initialized so will contain an arbitrary value… | 2024-04-17T05:01:56.808008Z |
| gsd-2024-32624 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.752708Z |
| gsd-2024-32623 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.735689Z |
| gsd-2024-32622 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.759963Z |
| gsd-2024-32621 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.806292Z |
| gsd-2024-32620 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.763957Z |
| gsd-2024-32619 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.826672Z |
| gsd-2024-32618 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.814307Z |
| gsd-2024-32617 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.777069Z |
| gsd-2024-32616 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.883715Z |
| gsd-2024-32615 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.879864Z |
| gsd-2024-32614 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.882434Z |
| gsd-2024-32613 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.903371Z |
| gsd-2024-32612 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.740949Z |
| gsd-2024-32611 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.751442Z |
| gsd-2024-32610 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.870487Z |
| gsd-2024-32609 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.830655Z |
| gsd-2024-32608 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.871839Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-975 | Malicious code in reqzest (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| MAL-2025-969 | Malicious code in reqiest (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| MAL-2025-968 | Malicious code in reqeuts (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| MAL-2025-966 | Malicious code in reqest (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| MAL-2025-942 | Malicious code in langer-updater (PyPI) | 2024-12-16T10:40:50Z | 2025-12-31T02:45:15Z |
| MAL-2025-935 | Malicious code in hugginglega (PyPI) | 2024-12-29T19:16:24Z | 2025-12-31T02:45:15Z |
| MAL-2025-926 | Malicious code in flasl (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| MAL-2025-923 | Malicious code in fflask (PyPI) | 2024-12-24T18:09:49Z | 2025-12-31T02:45:15Z |
| MAL-2025-6973 | Malicious code in flatfox-api-python (PyPI) | 2025-08-18T18:31:35Z | 2025-12-31T02:45:15Z |
| MAL-2025-6787 | Malicious code in flatfox-api (PyPI) | 2025-07-30T10:19:17Z | 2025-12-31T02:45:15Z |
| MAL-2025-6579 | Malicious code in runway-python (PyPI) | 2025-07-31T19:16:19Z | 2025-12-31T02:45:15Z |
| MAL-2025-6575 | Malicious code in rehttps (PyPI) | 2025-07-01T16:05:05Z | 2025-12-31T02:45:15Z |
| MAL-2025-6566 | Malicious code in piprce (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| MAL-2025-6529 | Malicious code in jirawrapped (PyPI) | 2025-07-02T10:07:35Z | 2025-12-31T02:45:15Z |
| MAL-2025-6515 | Malicious code in graphdict (PyPI) | 2025-07-09T18:18:10Z | 2025-12-31T02:45:15Z |
| MAL-2025-6513 | Malicious code in gramapi (PyPI) | 2025-07-11T22:51:02Z | 2025-12-31T02:45:15Z |
| MAL-2025-6499 | Malicious code in elbloadmonitor (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| MAL-2025-6495 | Malicious code in discord-booster (PyPI) | 2025-05-29T22:39:05Z | 2025-12-31T02:45:15Z |
| MAL-2025-6486 | Malicious code in crpt1 (PyPI) | 2025-07-13T13:25:08Z | 2025-12-31T02:45:15Z |
| MAL-2025-6010 | Malicious code in ruamel-poc (PyPI) | 2025-07-20T08:05:43Z | 2025-12-31T02:45:15Z |
| MAL-2025-5130 | Malicious code in rich-figlet (PyPI) | 2025-05-15T21:07:23Z | 2025-12-31T02:45:15Z |
| MAL-2025-5102 | Malicious code in coloraiz (PyPI) | 2025-05-16T10:10:16Z | 2025-12-31T02:45:15Z |
| MAL-2025-5099 | Malicious code in c8test (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| MAL-2025-5094 | Malicious code in ai-labs-snippets-sdk (PyPI) | 2025-05-19T15:43:26Z | 2025-12-31T02:45:15Z |
| MAL-2025-49320 | Malicious code in python-requirements-inspector (PyPI) | 2025-11-02T23:10:55Z | 2025-12-31T02:45:15Z |
| MAL-2025-49310 | Malicious code in faker-python (PyPI) | 2025-11-02T23:05:33Z | 2025-12-31T02:45:15Z |
| MAL-2025-48896 | Malicious code in regixtest (PyPI) | 2025-10-01T06:38:19Z | 2025-12-31T02:45:15Z |
| MAL-2025-48895 | Malicious code in netkit-lite (PyPI) | 2025-09-26T15:42:58Z | 2025-12-31T02:45:15Z |
| MAL-2025-48892 | Malicious code in hackerone-app-sdk (PyPI) | 2025-09-17T15:17:50Z | 2025-12-31T02:45:15Z |
| MAL-2025-48889 | Malicious code in cugraph-service-server (PyPI) | 2025-09-21T09:56:16Z | 2025-12-31T02:45:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-3105 | Red Hat Enterprise Linux (tracker-miners): Schwachstelle ermöglicht Codeausführung | 2023-12-11T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2655 | Node.js: Mehrere Schwachstellen | 2023-10-15T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-1572 | jQuery: Schwachstelle ermöglicht Cross-Site Scripting | 2023-06-26T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-1480 | FasterXML Jackson: Schwachstelle ermöglicht Denial of Service | 2023-06-14T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-0055 | Microsoft Windows und Microsoft Windows Server: Mehrere Schwachstellen | 2023-01-10T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2022-1608 | FasterXML Jackson: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-10-03T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2022-0759 | Oracle Java SE: Mehrere Schwachstellen | 2022-07-19T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1049 | Intel PROSet Wireless WiFi Software: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1048 | Microsoft Defender: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1047 | Red Hat Enterprise Linux (exiv2): Schwachstelle ermöglicht Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1046 | Adobe Creative Cloud Applikationen: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1045 | Adobe Dreamweaver: Schwachstelle ermöglicht Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1044 | Adobe Connect: Mehrere Schwachstellen ermöglichen Cross-Site Scripting und Rechteerweiterung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1043 | sudo-rs: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1040 | Red Hat Enterprise Linux (perl-Module-ScanDeps): Schwachstelle ermöglicht Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1039 | Adobe Photoshop: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1037 | Ivanti Neurons for MDM: Schwachstelle ermöglicht Manipulation von Dateien | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1036 | Red Hat Enterprise Linux (Aardvark-dns): Schwachstelle ermöglicht Denial of Service | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1035 | Xerox FreeFlow Print Server: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1033 | Ivanti Endpoint Manager Mobile: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1032 | Ivanti Cloud Services Application: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1027 | Fortinet FortiVoice, FortiMail und FortiRecorder: Schwachstelle ermöglicht Codeausführung | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1026 | Fortinet FortiOS, FortiProxy und FortiSwitch: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1025 | Fortinet FortiOS: Mehrere Schwachstellen ermöglicht Denial of Service | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1024 | Fortinet FortiPortal: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1023 | Phoenix Technologies BIOS (SCT4): Schwachstelle ermöglicht Denial of Service | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1021 | Fortinet FortiClient Mac, Windows, EMS und FortiVoice: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1019 | Checkmk: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1018 | Fortinet FortiManager: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1016 | Microsoft Dataverse: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2022:2280 | Red Hat Security Advisory: OpenShift Container Platform 3.11.705 security update | 2022-05-31T05:45:09+00:00 | 2026-02-03T21:12:44+00:00 |
| rhsa-2022:2265 | Red Hat Security Advisory: OpenShift Container Platform 4.6.58 security and extras update | 2022-05-26T20:06:24+00:00 | 2026-02-03T21:12:43+00:00 |
| rhsa-2022:2218 | Red Hat Security Advisory: Openshift Logging Security and Bug update Release (5.2.10) | 2022-05-11T19:51:53+00:00 | 2026-02-03T21:12:43+00:00 |
| rhsa-2022:2216 | Red Hat Security Advisory: Red Hat OpenShift Logging Security and Bug update Release 5.4.1 | 2022-05-11T18:50:05+00:00 | 2026-02-03T21:12:42+00:00 |
| rhsa-2022:2183 | Red Hat Security Advisory: Release of containers for OSP 16.2.z director operator tech preview | 2022-05-11T11:33:14+00:00 | 2026-02-03T21:12:41+00:00 |
| rhsa-2022:1819 | Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update | 2022-05-10T14:02:26+00:00 | 2026-02-03T21:12:41+00:00 |
| rhsa-2022:1762 | Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update | 2022-05-10T14:19:56+00:00 | 2026-02-03T21:12:41+00:00 |
| rhsa-2022:1747 | Red Hat Security Advisory: Release of OpenShift Serverless Version 1.22.0 | 2022-05-09T16:47:58+00:00 | 2026-02-03T21:12:40+00:00 |
| rhsa-2022:1745 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.22.0 | 2022-05-09T07:48:15+00:00 | 2026-02-03T21:12:40+00:00 |
| rhsa-2022:1734 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.1 security and bug fix update | 2022-05-05T13:49:11+00:00 | 2026-02-03T21:12:39+00:00 |
| rhsa-2022:1699 | Red Hat Security Advisory: OpenShift Container Platform 4.7.50 security update | 2022-05-12T18:05:11+00:00 | 2026-02-03T21:12:38+00:00 |
| rhsa-2022:1681 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.4 security updates and bug fixes | 2022-05-03T16:42:03+00:00 | 2026-02-03T21:12:38+00:00 |
| rhsa-2022:1622 | Red Hat Security Advisory: OpenShift Container Platform 4.6.57 security and extras update | 2022-05-04T09:05:42+00:00 | 2026-02-03T21:12:37+00:00 |
| rhsa-2022:1476 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.3 security updates and bug fixes | 2022-04-21T02:42:32+00:00 | 2026-02-03T21:12:37+00:00 |
| rhsa-2022:1461 | Red Hat Security Advisory: Logging Subsystem 5.4 - Red Hat OpenShift Security and Bug update | 2022-04-20T22:57:16+00:00 | 2026-02-03T21:12:35+00:00 |
| rhsa-2022:1372 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 enhancement, security & bug fix update | 2022-04-13T18:48:58+00:00 | 2026-02-03T21:12:35+00:00 |
| rhsa-2022:1370 | Red Hat Security Advisory: OpenShift Container Platform 4.8.37 security and extras update | 2022-04-20T12:18:41+00:00 | 2026-02-03T21:12:34+00:00 |
| rhsa-2022:1363 | Red Hat Security Advisory: OpenShift Container Platform 4.9.29 bug fix and security update | 2022-04-20T14:43:46+00:00 | 2026-02-03T21:12:34+00:00 |
| rhsa-2022:1361 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.0 RPM security,enhancement&bugfix update | 2022-04-13T15:33:28+00:00 | 2026-02-03T21:12:33+00:00 |
| rhsa-2022:1357 | Red Hat Security Advisory: OpenShift Container Platform 4.10.10 security and extras update | 2022-04-20T11:41:10+00:00 | 2026-02-03T21:12:32+00:00 |
| rhsa-2022:1356 | Red Hat Security Advisory: OpenShift Container Platform 4.10.10 bug fix and security update | 2022-04-21T13:13:54+00:00 | 2026-02-03T21:12:32+00:00 |
| rhsa-2022:1276 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.9 security update | 2022-04-07T18:02:07+00:00 | 2026-02-03T21:12:32+00:00 |
| rhsa-2022:1081 | Red Hat Security Advisory: Gatekeeper Operator v0.2 security updates and bug fixes | 2022-03-28T14:14:19+00:00 | 2026-02-03T21:12:30+00:00 |
| rhsa-2022:0595 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.6 security updates and bug fixes | 2022-03-04T01:35:35+00:00 | 2026-02-03T21:12:30+00:00 |
| rhsa-2022:0432 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.20.0 | 2022-02-03T16:10:33+00:00 | 2026-02-03T21:12:30+00:00 |
| rhsa-2022:0735 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.2 security updates and bug fixes | 2022-03-03T15:19:13+00:00 | 2026-02-03T21:12:29+00:00 |
| rhsa-2022:0687 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.1 security and bug fix update | 2022-02-28T21:18:28+00:00 | 2026-02-03T21:12:28+00:00 |
| rhsa-2022:0434 | Red Hat Security Advisory: Release of OpenShift Serverless 1.20.0 | 2022-02-03T20:05:14+00:00 | 2026-02-03T21:12:27+00:00 |
| rhsa-2022:0056 | Red Hat Security Advisory: OpenShift Container Platform 4.10.3 security update | 2022-03-10T16:00:51+00:00 | 2026-02-03T21:12:22+00:00 |
| rhsa-2022:0055 | Red Hat Security Advisory: OpenShift Container Platform 4.10.3 bug fix and security update | 2022-03-10T14:59:25+00:00 | 2026-02-03T21:12:22+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-163-04 | Intrado 911 Emergency Gateway | 2024-06-11T06:00:00.000000Z | 2024-06-11T06:00:00.000000Z |
| icsa-24-163-03 | AVEVA PI Asset Framework Client | 2024-06-11T06:00:00.000000Z | 2024-06-11T06:00:00.000000Z |
| icsa-24-163-02 | AVEVA PI Web API | 2024-06-11T06:00:00.000000Z | 2024-06-11T06:00:00.000000Z |
| icsa-24-163-01 | Rockwell Automation ControlLogix, GuardLogix, and CompactLogix | 2024-06-11T06:00:00.000000Z | 2024-06-11T06:00:00.000000Z |
| icsa-23-108-02 | Schneider Electric APC Easy UPS Online Monitoring Software (Update A) | 2023-04-18T06:00:00.000000Z | 2024-06-11T06:00:00.000000Z |
| icsa-24-165-11 | Siemens SCALANCE XM-400, XR-500 | 2024-06-11T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-24-165-10 | Siemens SIMATIC and SIPLUS | 2024-06-11T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-24-165-09 | Siemens SICAM AK3/BC/TM | 2024-06-11T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-24-165-07 | Siemens PowerSys | 2024-06-11T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-24-165-05 | Siemens SITOP UPS1600 | 2024-06-11T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-24-165-04 | Siemens ST7 ScadaConnect | 2024-06-11T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-24-165-03 | Siemens TIA Administrator | 2024-06-11T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-24-165-02 | Siemens SIMATIC S7-200 SMART Devices | 2024-06-11T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-24-165-01 | Siemens Mendix Applications | 2024-06-11T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-24-137-07 | Siemens SIMATIC RTLS Locating Manager | 2024-05-14T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-24-137-02 | Siemens SICAM Products | 2024-05-14T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-23-285-06 | Siemens SICAM PAS/PQS | 2023-10-10T00:00:00.000000Z | 2024-06-11T00:00:00.000000Z |
| icsa-24-158-03 | Mitsubishi Electric CC-Link IE TSN Industrial Managed Switch | 2024-06-06T06:00:00.000000Z | 2024-06-06T06:00:00.000000Z |
| icsa-24-158-02 | Emerson Ovation | 2024-06-06T06:00:00.000000Z | 2024-06-06T06:00:00.000000Z |
| icsa-24-158-01 | Emerson PACSystem and Fanuc | 2024-06-06T06:00:00.000000Z | 2024-06-06T06:00:00.000000Z |
| icsa-23-278-03 | Mitsubishi Electric CC-Link IE TSN Industrial Managed Switch (Update A) | 2023-10-05T06:00:00.000000Z | 2024-06-04T06:00:00.000000Z |
| icsma-24-151-02 | Baxter Welch Allyn Connex Spot Monitor | 2024-05-30T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsma-24-151-01 | Baxter Welch Allyn Configuration Tool | 2024-05-30T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsa-24-151-04 | Westermo EDW-100 | 2024-05-30T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsa-24-151-03 | Inosoft VisiWin | 2024-05-30T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsa-24-151-01 | LenelS2 NetBox | 2024-05-30T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsa-22-172-01 | Mitsubishi Electric MELSEC iQ-R, Q, L Series and MELIPC Series (Update C) | 2022-06-14T06:00:00.000000Z | 2024-05-30T06:00:00.000000Z |
| icsa-24-149-01 | Campbell Scientific CSI Web Server | 2024-05-28T06:00:00.000000Z | 2024-05-28T06:00:00.000000Z |
| icsa-24-144-01 | AutomationDirect Productivity PLCs | 2024-05-23T06:00:00.000000Z | 2024-05-23T06:00:00.000000Z |
| icsa-24-142-01 | LCDS LAquis SCADA | 2024-05-21T06:00:00.000000Z | 2024-05-21T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nexus-acl-vrvQYPVe | Cisco Nexus 9500 Series Switches Access Control List Bypass Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-naci-mdvul-vrkvgnu | Cisco Nexus 9000 Series Fabric Switches ACI Mode Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-naci-mdvul-vrKVgNU | Cisco Nexus 9000 Series Fabric Switches ACI Mode Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-naci-afr-utjfo2d7 | Cisco Nexus 9000 Series Fabric Switches ACI Mode Arbitrary File Read Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-naci-afr-UtjfO2D7 | Cisco Nexus 9000 Series Fabric Switches ACI Mode Arbitrary File Read Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-n9kaci-queue-wedge-clddefkf | Cisco Nexus 9000 Series Fabric Switches ACI Mode Queue Wedge Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-n9kaci-queue-wedge-cLDDEfKF | Cisco Nexus 9000 Series Fabric Switches ACI Mode Queue Wedge Denial of Service Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-scss-bft75yrm | Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-scss-bFT75YrM | Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-pesc-pkmgk4j | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-pesc-pkmGK4J | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-20190515-nxos-pyth-escal | Cisco NX-OS Software Python Parser Privilege Escalation Vulnerability | 2019-05-15T16:00:00+00:00 | 2021-08-25T15:49:16+00:00 |
| cisco-sa-qnx-toxjvpdl | BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021 | 2021-08-18T16:00:00+00:00 | 2021-08-25T14:44:04+00:00 |
| cisco-sa-qnx-TOxjVPdL | BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021 | 2021-08-18T16:00:00+00:00 | 2021-08-25T14:44:04+00:00 |
| cisco-sa-sma-spam-jpxuxmk | Cisco Secure Email and Web Manager Spam Quarantine Unauthorized Access Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-sma-spam-jPxUXMk | Cisco Secure Email and Web Manager Spam Quarantine Unauthorized Access Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ipcamera-lldp-dos-ofp7j9j | Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Double-Free Denial of Service Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ipcamera-lldp-dos-OFP7j9j | Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Double-Free Denial of Service Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ewver-c6wzpxrx | Cisco Expressway Series and TelePresence Video Communication Server Image Verification Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ewver-c6WZPXRx | Cisco Expressway Series and TelePresence Video Communication Server Image Verification Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ewrce-qpynncjh | Cisco Expressway Series and TelePresence Video Communication Server Remote Code Execution Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ewrce-QPynNCjh | Cisco Expressway Series and TelePresence Video Communication Server Remote Code Execution Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-cisco-sb-rv-overflow-htpymmb5 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-cisco-sb-rv-overflow-htpymMB5 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ise-stored-xss-twwjvpdl | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-08-11T18:15:55+00:00 |
| cisco-sa-ise-stored-xss-TWwjVPdL | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-08-11T18:15:55+00:00 |
| cisco-sa-rv340-cmdinj-rcedos-py8j3qfy | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Web Management Vulnerabilities | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Web Management Vulnerabilities | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-rv-code-execution-9uvjr7k4 | Cisco Small Business RV160 and RV260 Series VPN Routers Remote Command Execution Vulnerability | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-rv-code-execution-9UVJr7k4 | Cisco Small Business RV160 and RV260 Series VPN Routers Remote Command Execution Vulnerability | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-55684 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55682 | Windows BitLocker Security Feature Bypass Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55681 | Desktop Windows Manager Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55680 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55679 | Windows Kernel Information Disclosure Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55678 | DirectX Graphics Kernel Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55677 | Windows Device Association Broker Service Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55340 | Windows Remote Desktop Protocol Security Feature Bypass | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55339 | Windows Network Driver Interface Specification Driver Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55338 | Windows BitLocker Security Feature Bypass Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55337 | Windows BitLocker Security Feature Bypass Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55336 | Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55335 | Windows NTFS Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55334 | Windows Kernel Security Feature Bypass Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55333 | Windows BitLocker Security Feature Bypass Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55332 | Windows BitLocker Security Feature Bypass Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55331 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55330 | Windows BitLocker Security Feature Bypass Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55328 | Windows Hyper-V Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55326 | Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55325 | Windows Storage Management Provider Information Disclosure Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55248 | .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55247 | .NET Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-55240 | Visual Studio Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-54112 | Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability | 2025-09-09T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-53782 | Microsoft Exchange Server Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-53768 | Xbox IStorageService Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-53717 | Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-53150 | Windows Digital Media Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-53139 | Windows Hello Security Feature Bypass Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14343-1 | ffmpeg-4-4.4.4-14.1 on GA media | 2024-09-18T00:00:00Z | 2024-09-18T00:00:00Z |
| opensuse-su-2024:14342-1 | assimp-devel-5.4.3-2.1 on GA media | 2024-09-18T00:00:00Z | 2024-09-18T00:00:00Z |
| opensuse-su-2024:0305-1 | Security update for gstreamer-plugins-bad | 2024-09-17T08:54:10Z | 2024-09-17T08:54:10Z |
| opensuse-su-2024:14341-1 | libwireshark18-4.4.0-2.1 on GA media | 2024-09-17T00:00:00Z | 2024-09-17T00:00:00Z |
| opensuse-su-2024:14340-1 | python38-3.8.20-1.1 on GA media | 2024-09-17T00:00:00Z | 2024-09-17T00:00:00Z |
| opensuse-su-2024:14339-1 | ffmpeg-5-5.1.4-13.1 on GA media | 2024-09-17T00:00:00Z | 2024-09-17T00:00:00Z |
| opensuse-su-2024:0304-1 | Security update for htmldoc | 2024-09-16T14:01:45Z | 2024-09-16T14:01:45Z |
| opensuse-su-2024:0303-1 | Security update for htmldoc | 2024-09-16T14:01:42Z | 2024-09-16T14:01:42Z |
| opensuse-su-2024:0302-1 | Security update for chromium | 2024-09-16T08:29:07Z | 2024-09-16T08:29:07Z |
| opensuse-su-2024:14338-1 | wpa_supplicant-2.11-1.1 on GA media | 2024-09-13T00:00:00Z | 2024-09-13T00:00:00Z |
| opensuse-su-2024:14337-1 | ucode-intel-20240910-1.1 on GA media | 2024-09-13T00:00:00Z | 2024-09-13T00:00:00Z |
| opensuse-su-2024:14336-1 | ovmf-202405-1.1 on GA media | 2024-09-13T00:00:00Z | 2024-09-13T00:00:00Z |
| opensuse-su-2024:14335-1 | chromedriver-128.0.6613.137-1.1 on GA media | 2024-09-13T00:00:00Z | 2024-09-13T00:00:00Z |
| opensuse-su-2024:14334-1 | grype-0.80.1-1.1 on GA media | 2024-09-12T00:00:00Z | 2024-09-12T00:00:00Z |
| opensuse-su-2024:14333-1 | curl-8.10.0-1.1 on GA media | 2024-09-12T00:00:00Z | 2024-09-12T00:00:00Z |
| opensuse-su-2024:0300-1 | Security update for ntpd-rs | 2024-09-11T10:01:59Z | 2024-09-11T10:01:59Z |
| opensuse-su-2024:14332-1 | keepalived-2.3.1+git59.b6681f98-1.1 on GA media | 2024-09-11T00:00:00Z | 2024-09-11T00:00:00Z |
| opensuse-su-2024:14331-1 | python39-3.9.20-1.1 on GA media | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| opensuse-su-2024:14330-1 | forgejo-8.0.3-1.1 on GA media | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| opensuse-su-2024:14329-1 | assimp-devel-5.4.3-1.1 on GA media | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| opensuse-su-2024:0294-1 | Security update for kanidm | 2024-09-09T12:04:21Z | 2024-09-09T12:04:21Z |
| opensuse-su-2024:14328-1 | x3270-4.3-4.1 on GA media | 2024-09-09T00:00:00Z | 2024-09-09T00:00:00Z |
| opensuse-su-2024:14327-1 | python39-3.9.19-8.1 on GA media | 2024-09-09T00:00:00Z | 2024-09-09T00:00:00Z |
| opensuse-su-2024:14326-1 | python313-3.13.0~rc2-1.1 on GA media | 2024-09-09T00:00:00Z | 2024-09-09T00:00:00Z |
| opensuse-su-2024:14325-1 | MozillaThunderbird-115.15.0-1.1 on GA media | 2024-09-09T00:00:00Z | 2024-09-09T00:00:00Z |
| opensuse-su-2024:14324-1 | go1.23-1.23.1-1.1 on GA media | 2024-09-08T00:00:00Z | 2024-09-08T00:00:00Z |
| opensuse-su-2024:14323-1 | go1.22-1.22.7-1.1 on GA media | 2024-09-06T00:00:00Z | 2024-09-06T00:00:00Z |
| opensuse-su-2024:14322-1 | expat-2.6.3-1.1 on GA media | 2024-09-06T00:00:00Z | 2024-09-06T00:00:00Z |
| opensuse-su-2024:14321-1 | docker-26.1.5_ce-2.1 on GA media | 2024-09-06T00:00:00Z | 2024-09-06T00:00:00Z |
| opensuse-su-2024:14320-1 | containerd-1.7.21-1.1 on GA media | 2024-09-06T00:00:00Z | 2024-09-06T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tensorflow-2020-15209 | Null pointer dereference in tensorflow-lite | 2024-03-06T11:20:28.655Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15208 | Data corruption in tensorflow-lite | 2024-03-06T11:20:29.898Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15207 | Segfault and data corruption in tensorflow-lite | 2024-03-06T11:20:31.155Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15206 | Denial of Service in Tensorflow | 2024-03-06T11:20:32.379Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15205 | Data leak in Tensorflow | 2024-03-06T11:20:33.621Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15204 | Segfault in Tensorflow | 2024-03-06T11:20:34.916Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15203 | Denial of Service in Tensorflow | 2024-03-06T11:20:36.172Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15202 | Integer truncation in Shard API usage | 2024-03-06T11:20:37.404Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15201 | Heap buffer overflow in Tensorflow | 2024-03-06T11:20:38.643Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15200 | Segfault in Tensorflow | 2024-03-06T11:20:39.865Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15199 | Denial of Service in Tensorflow | 2024-03-06T11:20:41.128Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15198 | Heap buffer overflow in Tensorflow | 2024-03-06T11:20:42.418Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15197 | Denial of Service in Tensorflow | 2024-03-06T11:20:43.693Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15196 | Heap buffer overflow in Tensorflow | 2024-03-06T11:20:44.959Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15195 | Heap buffer overflow in Tensorflow | 2024-03-06T11:20:46.206Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15194 | Denial of Service in Tensorflow | 2024-03-06T11:20:47.450Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15193 | Memory corruption in Tensorflow | 2024-03-06T11:20:48.722Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15192 | Memory leak in Tensorflow | 2024-03-06T11:20:49.978Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15191 | Undefined behavior in Tensorflow | 2024-03-06T11:20:51.213Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2020-15190 | Segfault in Tensorflow | 2024-03-06T11:20:52.431Z | 2025-05-20T10:02:07.006Z |
| bit-syncthing-2022-46165 | Cross-site Scripting (XSS) in Web GUI in syncthing | 2024-07-24T19:38:31.354Z | 2025-05-20T10:02:07.006Z |
| bit-syncthing-2021-21404 | Crash due to malformed relay protocol message | 2024-07-24T19:38:44.658Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-55633 | Apache Superset: SQLLab Improper readonly query validation allows unauthorized write access | 2025-02-05T07:24:52.298Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-53949 | Apache Superset: Lower privilege users are able to create Role when FAB_ADD_SECURITY_API is enabled | 2025-02-05T07:24:59.693Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-53948 | Apache Superset: Error verbosity exposes metadata in analytics databases | 2025-02-05T07:25:06.905Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-53947 | Apache Superset: Improper SQL authorisation, parse not checking for specific postgres functions | 2025-04-14T11:37:01.543Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-39887 | Apache Superset: Improper SQL authorisation, parse not checking for specific engine functions | 2025-02-05T07:25:23.689Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-34693 | Apache Superset: Server arbitrary file read | 2025-02-05T07:25:30.309Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-28148 | Apache Superset: Incorrect datasource authorization on explore REST API | 2025-02-05T07:25:37.993Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2024-27315 | Apache Superset: Improper error handling on alerts | 2025-02-05T07:25:46.001Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-200609-1335 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2024-06-11T21:44:28.628000Z |
| var-202308-0239 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T21:37:33.070000Z |
| var-202107-1608 | Affected devices contain a vulnerability that allows an unauthenticated attacker to trigg… | 2024-06-11T21:23:54.270000Z |
| var-200609-1025 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2024-06-11T21:00:15.795000Z |
| var-202311-0434 | Affected devices do not properly validate the length of inputs when performing certain co… | 2024-06-11T20:49:25.151000Z |
| var-202308-0235 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:44:06.833000Z |
| var-202308-0236 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:39:39.547000Z |
| var-202308-0242 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:29:19.020000Z |
| var-202301-0605 | Affected devices do not contain an Immutable Root of Trust in Hardware. With this the int… | 2024-06-11T20:07:07.374000Z |
| var-202308-0237 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:04:39.157000Z |
| var-202308-0234 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T19:29:50.522000Z |
| var-202101-0146 | A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) al… | 2024-06-10T23:02:24.713000Z |
| var-202401-1629 | Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC … | 2024-06-10T23:02:20.710000Z |
| var-202103-1564 | Netty is an open-source, asynchronous event-driven network application framework for rapi… | 2024-06-10T21:06:19.954000Z |
| var-200110-0175 | The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2024-06-10T20:51:29.701000Z |
| var-200609-0685 | The VPN service in Apple Mac OS X 10.3.x through 10.3.9 and 10.4.x through 10.4.8 does no… | 2024-06-10T20:21:01.994000Z |
| var-200405-0014 | Unknown vulnerability in the CUPS printing system in Mac OS X 10.3.3 and Mac OS X 10.2.8 … | 2024-06-09T23:16:08.911000Z |
| var-200407-0077 | Integer overflow in Apple QuickTime (QuickTime.qts) before 6.5.1 allows attackers to exec… | 2024-06-09T23:13:11.097000Z |
| var-200405-0015 | Unknown vulnerability in Mail for Mac OS X 10.3.3 and 10.2.8, with unknown impact, relate… | 2024-06-09T23:11:31.075000Z |
| var-200407-0052 | Argument injection vulnerability in the SSH URI handler for Safari on Mac OS 10.3.3 and e… | 2024-06-09T23:09:18.606000Z |
| var-200411-0076 | Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 1545… | 2024-06-09T23:07:21.196000Z |
| var-200411-0075 | Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) al… | 2024-06-09T23:07:21.165000Z |
| var-200411-0074 | Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and C… | 2024-06-09T23:07:21.232000Z |
| var-200408-0124 | HP Integrated Lights-Out (iLO) 1.10 and other versions before 1.55 allows remote attacker… | 2024-06-09T23:05:35.469000Z |
| var-200408-0090 | The "Show in Finder" button in the Safari web browser in Mac OS X 10.3.4 and 10.2.8 may e… | 2024-06-09T23:04:44.017000Z |
| var-200406-0041 | Cisco Wireless LAN Solution Engine (WLSE) 2.0 through 2.5 and Hosting Solution Engine (HS… | 2024-06-09T23:04:44.092000Z |
| var-200408-0089 | LaunchServices in Mac OS X 10.3.4 and 10.2.8 automatically registers and executes new app… | 2024-06-09T23:04:43.969000Z |
| var-200411-0149 | Cisco 11000 Series Content Services Switches (CSS) running WebNS 5.0(x) before 05.0(04.07… | 2024-06-09T23:01:32.729000Z |
| var-200408-0113 | Unknown vulnerability in AppleFileServer for Mac OS X 10.3.4, related to "the use of SSH … | 2024-06-09T22:57:27.818000Z |
| var-200408-0112 | Unknown vulnerability in Mac OS X 10.3.4, related to "handling of process IDs during pack… | 2024-06-09T22:57:27.883000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000158 | Zend Framework vulnerable to SQL injection | 2016-09-15T14:11+09:00 | 2017-03-16T14:15+09:00 |
| jvndb-2017-000013 | Nessus vulnerable to cross-site scripting | 2017-01-24T13:38+09:00 | 2017-02-20T17:44+09:00 |
| jvndb-2016-000096 | Apache Struts 1 vulnerability that allows unintended remote operations against components on memory | 2016-06-07T16:26+09:00 | 2017-02-20T15:42+09:00 |
| jvndb-2017-000025 | Apache Brooklyn vulnerable to cross-site scripting | 2017-02-15T16:20+09:00 | 2017-02-15T16:20+09:00 |
| jvndb-2017-000015 | Norton Download Manager may insecurely load Dynamic Link Libraries | 2017-02-10T14:58+09:00 | 2017-02-10T14:58+09:00 |
| jvndb-2017-000012 | Java (OGNL) code execution in Apache Struts 2 when devMode is enabled | 2017-01-20T14:01+09:00 | 2017-01-20T14:01+09:00 |
| jvndb-2014-000048 | OpenSSL improper handling of Change Cipher Spec message | 2014-06-06T13:48+09:00 | 2016-12-27T11:49+09:00 |
| jvndb-2014-000017 | Apache Commons FileUpload vulnerable to denial-of-service (DoS) | 2014-02-10T17:21+09:00 | 2016-12-27T11:49+09:00 |
| jvndb-2016-000097 | Apache Struts 1 vulnerable to input validation bypass | 2016-06-07T16:26+09:00 | 2016-12-05T16:59+09:00 |
| jvndb-2016-002331 | ManageEngine Password Manager Pro fails to restrict access permissions | 2016-12-05T15:02+09:00 | 2016-12-05T15:02+09:00 |
| jvndb-2016-002298 | Keitai Kit for Movable Type vulnerable to OS command injection | 2016-12-05T15:02+09:00 | 2016-12-05T15:02+09:00 |
| jvndb-2016-005655 | Vulnerabilitie in JP1/IT Desktop Management 2 - Manager and JP1/NETM/DM | 2016-11-10T16:59+09:00 | 2016-11-10T16:59+09:00 |
| jvndb-2016-000151 | YoruFukurou (NightOwl) vulnerable to denial-of-service (DoS) | 2016-08-24T14:14+09:00 | 2016-10-27T09:43+09:00 |
| jvndb-2016-000134 | Multiple I-O DATA Recording Hard disk products vulnerable to cross-site request forgery | 2016-08-08T12:28+09:00 | 2016-10-24T18:27+09:00 |
| jvndb-2007-000226 | BASP21 vulnerable to mail header injection | 2008-05-21T00:00+09:00 | 2016-10-13T14:45+09:00 |
| jvndb-2016-000195 | Cryptography API: Next Generation (CNG) vulnerable to denial-of-service (DoS) | 2016-10-07T14:11+09:00 | 2016-10-07T14:11+09:00 |
| jvndb-2016-004496 | Information Disclosure Vulnerability in Hitachi Automation Director and JP1/Automatic Operation | 2016-09-02T16:09+09:00 | 2016-09-30T09:47+09:00 |
| jvndb-2016-000166 | Trend Micro Internet Security vulnerability where files may be excluded as scan targets | 2016-09-16T14:31+09:00 | 2016-09-16T14:31+09:00 |
| jvndb-2016-003527 | Information Disclosure Vulnerability in Hitachi Command Suite | 2016-08-02T13:50+09:00 | 2016-09-14T18:18+09:00 |
| jvndb-2016-001472 | Remote File Inclusion Vulnerability in Hitachi Command Suite | 2016-02-25T16:09+09:00 | 2016-09-14T18:18+09:00 |
| jvndb-2015-006130 | Vulnerability in JP1/Automatic Job Management System 3 | 2015-12-17T16:19+09:00 | 2016-09-14T18:18+09:00 |
| jvndb-2011-001632 | Arbitrary Data Insertion Vulnerability in Hitachi Web Server SSL/TLS Protocol | 2011-06-29T17:55+09:00 | 2016-09-08T17:05+09:00 |
| jvndb-2016-000154 | Multiple AKABEi SOFT2 LTD. games vulnerable to OS command injection | 2016-08-31T15:33+09:00 | 2016-09-05T17:56+09:00 |
| jvndb-2016-000152 | simple chat vulnerable to cross-site scripting | 2016-08-23T13:37+09:00 | 2016-09-05T17:45+09:00 |
| jvndb-2016-000140 | ClipBucket vulnerable to cross-site scripting | 2016-08-18T14:09+09:00 | 2016-09-05T17:41+09:00 |
| jvndb-2015-000052 | Seasar S2Struts vulnerable to input validation bypass | 2015-04-10T14:38+09:00 | 2016-08-26T16:39+09:00 |
| jvndb-2015-000042 | The Validator in TERASOLUNA Server Framework for Java(WEB) vulnerable to input validation bypass | 2015-03-24T14:10+09:00 | 2016-08-26T16:37+09:00 |
| jvndb-2016-000123 | LINE for Windows may insecurely load Dynamic Link Libraries | 2016-07-08T14:29+09:00 | 2016-08-19T17:44+09:00 |
| jvndb-2016-000125 | WordPress plugin "Nofollow Links" vulnerable to cross-site scripting | 2016-07-20T14:56+09:00 | 2016-08-05T17:40+09:00 |
| jvndb-2016-000127 | Android stock browser vulnerable to denial-of-service (DoS) | 2016-08-05T13:41+09:00 | 2016-08-05T13:41+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02462-1 | Security update for php8 | 2025-07-22T08:41:03Z | 2025-07-22T08:41:03Z |
| suse-su-2025:02460-1 | Security update for python | 2025-07-22T05:48:26Z | 2025-07-22T05:48:26Z |
| suse-su-2025:02459-1 | Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 2025-07-22T05:04:25Z | 2025-07-22T05:04:25Z |
| suse-su-2025:02456-1 | Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3) | 2025-07-21T21:18:35Z | 2025-07-21T21:18:35Z |
| suse-su-2025:02455-1 | Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) | 2025-07-21T19:33:42Z | 2025-07-21T19:33:42Z |
| suse-su-2025:01783-2 | Security update for postgresql17 | 2025-07-21T19:31:41Z | 2025-07-21T19:31:41Z |
| suse-su-2025:02454-1 | Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) | 2025-07-21T19:03:58Z | 2025-07-21T19:03:58Z |
| suse-su-2025:02451-1 | Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4) | 2025-07-21T17:33:48Z | 2025-07-21T17:33:48Z |
| suse-su-2025:02449-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | 2025-07-21T15:33:47Z | 2025-07-21T15:33:47Z |
| suse-su-2025:02448-1 | Security update for python-oslo.utils | 2025-07-21T14:46:13Z | 2025-07-21T14:46:13Z |
| suse-su-2025:02447-1 | Security update for libgcrypt | 2025-07-21T14:45:26Z | 2025-07-21T14:45:26Z |
| suse-su-2025:02446-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | 2025-07-21T14:33:46Z | 2025-07-21T14:33:46Z |
| suse-su-2025:02445-1 | Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP4) | 2025-07-21T14:04:05Z | 2025-07-21T14:04:05Z |
| suse-su-2025:02444-1 | Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4) | 2025-07-21T13:04:21Z | 2025-07-21T13:04:21Z |
| suse-su-2025:02442-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 2025-07-21T12:34:23Z | 2025-07-21T12:34:23Z |
| suse-su-2025:02439-1 | Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6) | 2025-07-21T12:34:00Z | 2025-07-21T12:34:00Z |
| suse-su-2025:02438-1 | Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP5) | 2025-07-21T12:33:57Z | 2025-07-21T12:33:57Z |
| suse-su-2025:02437-1 | Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5) | 2025-07-21T12:33:50Z | 2025-07-21T12:33:50Z |
| suse-su-2025:02436-1 | Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 2025-07-21T12:33:43Z | 2025-07-21T12:33:43Z |
| suse-su-2025:02440-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 2025-07-21T12:04:43Z | 2025-07-21T12:04:43Z |
| suse-su-2025:02434-1 | Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4) | 2025-07-21T12:04:26Z | 2025-07-21T12:04:26Z |
| suse-su-2025:02433-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) | 2025-07-21T11:33:36Z | 2025-07-21T11:33:36Z |
| suse-su-2025:02432-1 | Security update for iputils | 2025-07-21T11:23:54Z | 2025-07-21T11:23:54Z |
| suse-su-2025:02431-1 | Security update for iputils | 2025-07-21T11:23:49Z | 2025-07-21T11:23:49Z |
| suse-su-2025:02430-1 | Security update for iputils | 2025-07-21T11:23:21Z | 2025-07-21T11:23:21Z |
| suse-su-2025:02429-1 | Security update for rmt-server | 2025-07-21T11:04:10Z | 2025-07-21T11:04:10Z |
| suse-su-2025:20502-1 | Security update for iputils | 2025-07-21T10:04:01Z | 2025-07-21T10:04:01Z |
| suse-su-2025:02428-1 | Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) | 2025-07-21T09:04:15Z | 2025-07-21T09:04:15Z |
| suse-su-2025:02427-1 | Security update for python3 | 2025-07-21T08:54:02Z | 2025-07-21T08:54:02Z |
| suse-su-2025:02422-1 | Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) | 2025-07-21T08:33:35Z | 2025-07-21T08:33:35Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-29412 | Revive Adserver格式字符中和不当漏洞 | 2025-11-24 | 2025-11-26 |
| cnvd-2025-29411 | Revive Adserver不受控资源消耗漏洞 | 2025-11-24 | 2025-11-26 |
| cnvd-2025-29410 | Revive Adserver用户管理系统设计不安全漏洞 | 2025-11-24 | 2025-11-26 |
| cnvd-2025-29409 | Revive Adserver stats-conversions.php脚本跨站脚本漏洞 | 2025-11-24 | 2025-11-26 |
| cnvd-2025-29408 | Revive Adserver暴力攻击漏洞 | 2023-04-19 | 2025-11-26 |
| cnvd-2025-29407 | Revive Adserver跨站脚本漏洞(CNVD-2025-29407) | 2023-09-20 | 2025-11-26 |
| cnvd-2025-29406 | Revive Adserver admin-search.php文件跨站脚本漏洞 | 2025-11-05 | 2025-11-26 |
| cnvd-2025-29405 | Revive Adserver SQL注入漏洞 | 2025-11-05 | 2025-11-26 |
| cnvd-2025-29404 | Desktop Alert PingAlert信息泄露漏洞(CNVD-2025-29404) | 2025-11-18 | 2025-11-26 |
| cnvd-2025-29403 | Desktop Alert PingAlert跨站脚本漏洞 | 2025-11-18 | 2025-11-26 |
| cnvd-2025-29402 | Desktop Alert PingAlert权限提升漏洞 | 2025-11-18 | 2025-11-26 |
| cnvd-2025-29401 | Desktop Alert PingAlert信息泄露漏洞 | 2025-11-18 | 2025-11-26 |
| cnvd-2025-29400 | Desktop Alert PingAlert访问控制不当漏洞 | 2025-11-18 | 2025-11-26 |
| cnvd-2025-29392 | Mediawiki - MultiBoilerplate Extensionmaste跨站脚本漏洞 | 2025-10-23 | 2025-11-26 |
| cnvd-2025-29391 | Mediawiki - LastModified Extension跨站脚本漏洞 | 2025-10-23 | 2025-11-26 |
| cnvd-2025-29390 | Mediawiki - LanguageSelector Extension代码注入漏洞 | 2025-10-23 | 2025-11-26 |
| cnvd-2025-29389 | Mediawiki - ImageRating Extension跨站脚本漏洞 | 2025-10-23 | 2025-11-26 |
| cnvd-2025-29388 | Mediawiki - GrowthExperiments Extension默认权限错误漏洞 | 2025-10-23 | 2025-11-26 |
| cnvd-2025-29387 | Mediawiki - GrowthExperiments Extension跨站脚本漏洞 | 2025-10-23 | 2025-11-26 |
| cnvd-2025-29386 | Mediawiki - FlexDiagrams Extension跨站脚本漏洞 | 2025-10-23 | 2025-11-26 |
| cnvd-2025-29385 | Mediawiki - ExternalGuidance跨站脚本漏洞 | 2025-10-23 | 2025-11-26 |
| cnvd-2025-29384 | Mediawiki - CirrusSearch Extension拒绝服务漏洞 | 2025-10-23 | 2025-11-26 |
| cnvd-2025-29383 | Mediawiki - CentralAuth Extension资源泄露漏洞 | 2025-10-23 | 2025-11-26 |
| cnvd-2025-29382 | Mediawiki - AdvancedSearch Extension跨站脚本漏洞 | 2025-10-23 | 2025-11-26 |
| cnvd-2025-29381 | Online Shopping Portal two_tables.php文件跨站脚本漏洞 | 2024-11-07 | 2025-11-25 |
| cnvd-2025-29380 | Online Shopping Portal js_data.php文件跨站脚本漏洞 | 2024-11-07 | 2025-11-25 |
| cnvd-2025-29379 | Online Shopping Portal html_table.php文件跨站脚本漏洞 | 2024-11-07 | 2025-11-25 |
| cnvd-2025-29378 | Online Shopping Portal empty_table.php文件跨站脚本漏洞 | 2024-11-07 | 2025-11-25 |
| cnvd-2025-29377 | Online Shopping Portal dymanic_table.php文件跨站脚本漏洞 | 2024-11-07 | 2025-11-25 |
| cnvd-2025-29376 | Online Shopping Portal dom_data_two_headers.php文件跨站脚本漏洞 | 2024-11-07 | 2025-11-25 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0360 | Multiples vulnérabilités dans les produits Tenable | 2025-05-02T00:00:00.000000 | 2025-05-02T00:00:00.000000 |
| CERTFR-2025-AVI-0359 | Multiples vulnérabilités dans les produits Elastic | 2025-05-02T00:00:00.000000 | 2025-05-02T00:00:00.000000 |
| certfr-2025-avi-0358 | Multiples vulnérabilités dans les produits Mozilla | 2025-04-30T00:00:00.000000 | 2025-04-30T00:00:00.000000 |
| certfr-2025-avi-0357 | Vulnérabilité dans les produits Symantec | 2025-04-30T00:00:00.000000 | 2025-04-30T00:00:00.000000 |
| certfr-2025-avi-0356 | Multiples vulnérabilités dans Splunk User Behavior Analytics (UBA) | 2025-04-30T00:00:00.000000 | 2025-04-30T00:00:00.000000 |
| certfr-2025-avi-0354 | Multiples vulnérabilités dans Google Chrome | 2025-04-30T00:00:00.000000 | 2025-04-30T00:00:00.000000 |
| certfr-2025-avi-0258 | Multiples vulnérabilités dans les produits Apple | 2025-04-01T00:00:00.000000 | 2025-04-30T00:00:00.000000 |
| CERTFR-2025-AVI-0358 | Multiples vulnérabilités dans les produits Mozilla | 2025-04-30T00:00:00.000000 | 2025-04-30T00:00:00.000000 |
| CERTFR-2025-AVI-0357 | Vulnérabilité dans les produits Symantec | 2025-04-30T00:00:00.000000 | 2025-04-30T00:00:00.000000 |
| CERTFR-2025-AVI-0356 | Multiples vulnérabilités dans Splunk User Behavior Analytics (UBA) | 2025-04-30T00:00:00.000000 | 2025-04-30T00:00:00.000000 |
| CERTFR-2025-AVI-0354 | Multiples vulnérabilités dans Google Chrome | 2025-04-30T00:00:00.000000 | 2025-04-30T00:00:00.000000 |
| CERTFR-2025-AVI-0258 | Multiples vulnérabilités dans les produits Apple | 2025-04-01T00:00:00.000000 | 2025-04-30T00:00:00.000000 |
| certfr-2025-avi-0353 | Multiples vulnérabilités dans les produits VMware | 2025-04-29T00:00:00.000000 | 2025-04-29T00:00:00.000000 |
| certfr-2025-avi-0352 | Multiples vulnérabilités dans Apache Tomcat | 2025-04-29T00:00:00.000000 | 2025-04-29T00:00:00.000000 |
| CERTFR-2025-AVI-0353 | Multiples vulnérabilités dans les produits VMware | 2025-04-29T00:00:00.000000 | 2025-04-29T00:00:00.000000 |
| CERTFR-2025-AVI-0352 | Multiples vulnérabilités dans Apache Tomcat | 2025-04-29T00:00:00.000000 | 2025-04-29T00:00:00.000000 |
| certfr-2025-avi-0351 | Vulnérabilité dans LibreOffice | 2025-04-28T00:00:00.000000 | 2025-04-28T00:00:00.000000 |
| certfr-2025-avi-0074 | Vulnérabilité dans Synacor Zimbra Collaboration | 2025-01-28T00:00:00.000000 | 2025-04-28T00:00:00.000000 |
| CERTFR-2025-AVI-0351 | Vulnérabilité dans LibreOffice | 2025-04-28T00:00:00.000000 | 2025-04-28T00:00:00.000000 |
| CERTFR-2025-AVI-0074 | Vulnérabilité dans Synacor Zimbra Collaboration | 2025-01-28T00:00:00.000000 | 2025-04-28T00:00:00.000000 |
| certfr-2025-avi-0349 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-04-25T00:00:00.000000 | 2025-04-25T00:00:00.000000 |
| certfr-2025-avi-0348 | Vulnérabilité dans Spring Boot | 2025-04-25T00:00:00.000000 | 2025-04-25T00:00:00.000000 |
| certfr-2025-avi-0347 | Vulnérabilité dans Sophos Taegis Endpoint Agent | 2025-04-25T00:00:00.000000 | 2025-04-25T00:00:00.000000 |
| certfr-2025-avi-0285 | Multiples vulnérabilités dans les produits SAP | 2025-04-08T00:00:00.000000 | 2025-04-25T00:00:00.000000 |
| CERTFR-2025-AVI-0349 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-04-25T00:00:00.000000 | 2025-04-25T00:00:00.000000 |
| CERTFR-2025-AVI-0348 | Vulnérabilité dans Spring Boot | 2025-04-25T00:00:00.000000 | 2025-04-25T00:00:00.000000 |
| CERTFR-2025-AVI-0347 | Vulnérabilité dans Sophos Taegis Endpoint Agent | 2025-04-25T00:00:00.000000 | 2025-04-25T00:00:00.000000 |
| CERTFR-2025-AVI-0285 | Multiples vulnérabilités dans les produits SAP | 2025-04-08T00:00:00.000000 | 2025-04-25T00:00:00.000000 |
| certfr-2025-avi-0346 | Multiples vulnérabilités dans GitLab | 2025-04-24T00:00:00.000000 | 2025-04-24T00:00:00.000000 |
| certfr-2025-avi-0345 | Vulnérabilité dans Sonicwall SonicOS | 2025-04-24T00:00:00.000000 | 2025-04-24T00:00:00.000000 |