Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1449 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Hisense TransTech Smart Bus Management System TireMng.… |
Hisense TransTech |
Smart Bus Management System |
2026-01-26T23:32:10.536Z | 2026-01-27T21:27:30.367Z |
| CVE-2025-68839 |
7.1 (3.1)
|
WordPress Easy Theme Options plugin <= 1.0 - Reflected… |
Remi Corson |
Easy Theme Options |
2026-01-22T16:52:09.179Z | 2026-01-27T21:26:58.151Z |
| CVE-2025-68884 |
7.1 (3.1)
|
WordPress WP Simple Redirect plugin <= 1.1 - Reflected… |
Arevico |
WP Simple Redirect |
2026-01-22T16:52:11.504Z | 2026-01-27T21:26:24.950Z |
| CVE-2025-68894 |
7.1 (3.1)
|
WordPress ShoutOut plugin <= 4.0.2 - Reflected Cross S… |
shoutoutglobal |
ShoutOut |
2026-01-22T16:52:11.717Z | 2026-01-27T21:25:48.058Z |
| CVE-2025-68896 |
6.5 (3.1)
|
WordPress WDV One Page Docs plugin <= 1.2.4 - Broken A… |
vrpr |
WDV One Page Docs |
2026-01-22T16:52:11.918Z | 2026-01-27T21:25:14.268Z |
| CVE-2025-68898 |
5.8 (3.1)
|
WordPress Synergy Project Manager plugin <= 1.5 - Cros… |
cjjparadoxmax |
Synergy Project Manager |
2026-01-22T16:52:12.134Z | 2026-01-27T21:23:31.362Z |
| CVE-2025-68899 |
8.8 (3.1)
|
WordPress Vivagh theme <= 2.4 - PHP Object Injection v… |
designthemes |
Vivagh |
2026-01-22T16:52:12.326Z | 2026-01-27T21:21:28.891Z |
| CVE-2025-34038 |
8.7 (4.0)
|
Weaver E-cology SQL Injection |
Weaver |
E-cology |
2025-06-24T01:06:35.820Z | 2026-01-27T21:20:55.873Z |
| CVE-2026-1504 |
6.5 (3.1)
|
Inappropriate implementation in Background Fetch … |
Google |
Chrome |
2026-01-27T20:46:35.796Z | 2026-01-27T21:16:21.039Z |
| CVE-2025-68900 |
6.5 (3.1)
|
WordPress Enfold theme <= 7.1.3 - Cross Site Scripting… |
Kriesi |
Enfold |
2026-01-22T16:52:12.531Z | 2026-01-27T21:03:12.668Z |
| CVE-2025-68901 |
8.6 (3.1)
|
WordPress Anona theme <= 8.0 - Arbitrary File Deletion… |
AivahThemes |
Anona |
2026-01-22T16:52:12.738Z | 2026-01-27T21:03:02.187Z |
| CVE-2025-68902 |
7.3 (3.1)
|
WordPress Anona theme <= 8.0 - Arbitrary File Download… |
AivahThemes |
Anona |
2026-01-22T16:52:12.937Z | 2026-01-27T21:02:00.466Z |
| CVE-2025-68903 |
8.8 (3.1)
|
WordPress Anona theme <= 8.0 - PHP Object Injection vu… |
AivahThemes |
Anona |
2026-01-22T16:52:13.150Z | 2026-01-27T21:00:55.783Z |
| CVE-2025-68905 |
7.5 (3.1)
|
WordPress JNews - Pay Writer plugin <= 11.0.0 - Local … |
jegtheme |
JNews - Pay Writer |
2026-01-22T16:52:13.550Z | 2026-01-27T20:59:32.092Z |
| CVE-2025-68858 |
7.1 (3.1)
|
WordPress wpCAS plugin <= 1.07 - Cross Site Scripting … |
Casey Bisson |
wpCAS |
2026-01-22T16:52:09.772Z | 2026-01-27T20:58:21.978Z |
| CVE-2025-68907 |
7.5 (3.1)
|
WordPress Hostme v2 theme <= 7.0 - Arbitrary File Dele… |
AivahThemes |
Hostme v2 |
2026-01-22T16:52:13.949Z | 2026-01-27T20:57:37.883Z |
| CVE-2025-68908 |
8.1 (3.1)
|
WordPress Barberry theme <= 2.9.9.87 - Local File Incl… |
temash |
Barberry |
2026-01-22T16:52:14.157Z | 2026-01-27T20:57:29.543Z |
| CVE-2026-24480 |
8.7 (4.0)
|
QGIS had validated RCE and Repository Takeover via Git… |
qgis |
QGIS |
2026-01-27T00:32:04.725Z | 2026-01-27T20:54:42.308Z |
| CVE-2025-68881 |
8.5 (3.1)
|
WordPress AppExperts plugin <= 1.4.5 - SQL Injection v… |
Saad Iqbal |
AppExperts |
2026-01-22T16:52:10.921Z | 2026-01-27T20:53:59.630Z |
| CVE-2026-1472 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:26:46.297Z | 2026-01-27T20:53:03.491Z |
| CVE-2026-1473 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:27:26.475Z | 2026-01-27T20:52:49.184Z |
| CVE-2026-1474 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:27:58.383Z | 2026-01-27T20:52:37.150Z |
| CVE-2026-1475 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:28:31.574Z | 2026-01-27T20:52:26.632Z |
| CVE-2026-24623 |
6.5 (3.1)
|
WordPress Neoforum plugin <= 1.0 - Reflected Cross Sit… |
saeros1984 |
Neoforum |
2026-01-23T14:29:07.026Z | 2026-01-27T20:52:22.218Z |
| CVE-2026-1476 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:29:18.270Z | 2026-01-27T20:52:18.549Z |
| CVE-2026-1477 |
9.3 (4.0)
|
Out-of-band SQL injection in Quatuor Performance Evaluation |
Quatuor |
Evaluación de Desempeño (EDD) |
2026-01-27T16:30:04.356Z | 2026-01-27T20:52:11.854Z |
| CVE-2026-24472 |
5.3 (3.1)
|
Hono cache middleware ignores "Cache-Control: private"… |
honojs |
hono |
2026-01-27T19:34:33.065Z | 2026-01-27T20:52:05.494Z |
| CVE-2026-24473 |
6.3 (4.0)
|
Hono has an Arbitrary Key Read in Serve static Middlew… |
honojs |
hono |
2026-01-27T19:37:52.012Z | 2026-01-27T20:51:59.157Z |
| CVE-2026-24771 |
4.7 (3.1)
|
Hono has a Cross-site Scripting vulnerability |
honojs |
hono |
2026-01-27T19:41:33.773Z | 2026-01-27T20:51:54.145Z |
| CVE-2026-24688 |
5.1 (4.0)
|
pypdf has possible Infinite Loop when processing outli… |
py-pdf |
pypdf |
2026-01-27T19:44:06.173Z | 2026-01-27T20:51:48.030Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1547 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Totolink A7000R cstecgi.cgi setUnloadUserData command … |
Totolink |
A7000R |
2026-01-28T22:02:10.788Z | 2026-01-29T16:54:19.511Z |
| CVE-2026-1201 |
9.4 (4.0)
|
Authorization Bypass Through User-Controlled Key in Hu… |
Hubitat |
Elevation C3 |
2026-01-22T21:52:01.011Z | 2026-01-29T16:51:31.043Z |
| CVE-2025-69072 |
8.1 (3.1)
|
WordPress Prider theme <= 1.1.3.1 - Local File Inclusi… |
AncoraThemes |
Prider |
2026-01-22T16:52:24.382Z | 2026-01-29T16:20:55.410Z |
| CVE-2025-68119 |
7 (3.1)
|
Unexpected code execution when invoking toolchain in cmd/go |
Go toolchain |
cmd/go |
2026-01-28T19:30:30.704Z | 2026-01-29T16:16:38.174Z |
| CVE-2025-61731 |
7.8 (3.1)
|
Arbitrary file write using cgo pkg-config directive in… |
Go toolchain |
cmd/go |
2026-01-28T19:30:30.844Z | 2026-01-29T16:17:24.194Z |
| CVE-2025-14975 |
8.1 (3.1)
|
Custom Login Page Customizer < 2.5.4 - Unauthenticated… |
Unknown |
Custom Login Page Customizer |
2026-01-29T06:00:02.451Z | 2026-01-29T16:53:48.369Z |
| CVE-2025-14840 |
7.5 (3.1)
|
HTTP Client Manager - Less critical - Information disc… |
Drupal |
HTTP Client Manager |
2026-01-28T20:03:21.686Z | 2026-01-29T16:30:13.234Z |
| CVE-2020-37013 |
0 (4.0)
8.4 (3.1)
|
Audio Playback Recorder 3.2.2 - Local Buffer Overflow (SEH) |
Tucows Inc. |
Audio Playback Recorder |
2026-01-29T14:28:31.891Z | 2026-01-29T16:48:09.267Z |
| CVE-2020-37012 |
9.3 (4.0)
9.8 (3.1)
|
Tea LaTex 1.0 - Remote Code Execution |
ammarfaizi2 |
Tea LaTex |
2026-01-29T14:28:31.559Z | 2026-01-29T16:48:14.346Z |
| CVE-2020-37011 |
0 (4.0)
7.5 (3.1)
|
Gnome Fonts Viewer 3.34.0 Heap Corruption |
GNOME |
Fonts Viewer |
2026-01-29T14:28:31.241Z | 2026-01-29T16:48:20.316Z |
| CVE-2020-37010 |
0 (4.0)
9.8 (3.1)
|
BearShare Lite 5.2.5 - 'Advanced Search'Buffer Overflo… |
BearshareOfficial |
BearShare Lite |
2026-01-29T14:28:30.843Z | 2026-01-29T16:48:25.853Z |
| CVE-2020-37009 |
8.7 (4.0)
8.8 (3.1)
|
MedDream PACS Server 6.8.3.751 - Remote Code Execution |
MedDream |
MedDream PACS Server |
2026-01-29T14:28:30.463Z | 2026-01-29T16:48:31.227Z |
| CVE-2020-37008 |
0 (4.0)
7.5 (3.1)
|
EasyPMS 1.0.0 - Authentication Bypass |
Elektraweb |
EasyPMS |
2026-01-29T14:28:30.079Z | 2026-01-29T16:48:36.395Z |
| CVE-2020-37007 |
0 (4.0)
5.3 (3.1)
|
Liman 0.7 - Cross-Site Request Forgery (Change Password) |
salihciftci |
Liman |
2026-01-29T14:28:29.695Z | 2026-01-29T16:48:41.228Z |
| CVE-2020-36979 |
8.5 (4.0)
7.8 (3.1)
|
Atheros Coex Service Application 8.0.0.255 -'ZAtheros … |
Atheros |
Coex Service Application |
2026-01-27T18:51:04.513Z | 2026-01-29T16:48:47.034Z |
| CVE-2020-36978 |
5.1 (4.0)
6.4 (3.1)
|
Froxlor Froxlor Server Management Panel 0.10.16 - Pers… |
Froxlor |
Froxlor Froxlor Server Management Panel |
2026-01-27T18:51:04.145Z | 2026-01-29T16:48:53.250Z |
| CVE-2020-36977 |
8.5 (4.0)
7.8 (3.1)
|
Wondershare Driver Install Service help 10.7.1.321 - '… |
Wondershare |
Wondershare Driver Install Service help |
2026-01-27T18:51:03.705Z | 2026-01-29T16:48:59.066Z |
| CVE-2020-36976 |
8.5 (4.0)
7.8 (3.1)
|
Global Registration Service 1.0.0.3 - 'GREGsvc.exe' U… |
Acer |
Global Registration Service |
2026-01-27T18:51:03.257Z | 2026-01-29T16:49:04.769Z |
| CVE-2020-36975 |
8.5 (4.0)
7.8 (3.1)
|
EPSON Status Monitor 3 'EPSON_PM_RPCV4_06' - Unquoted … |
SEIKO EPSON Corp |
Status Monitor 3 |
2026-01-27T18:51:02.299Z | 2026-01-29T16:49:10.392Z |
| CVE-2020-36974 |
8.5 (4.0)
7.8 (3.1)
|
Realtek Andrea RT Filters 1.0.64.7 - 'AERTSr64.EXE' Un… |
Realtek |
Realtek Andrea RT Filters |
2026-01-27T18:51:01.383Z | 2026-01-29T16:49:16.065Z |
| CVE-2025-39490 |
8.1 (3.1)
|
WordPress Backpack Traveler <= 2.7 - Local File Inclus… |
Mikado-Themes |
Backpack Traveler |
2025-05-23T12:43:54.481Z | 2025-05-23T13:24:17.888Z |
| CVE-2015-10145 |
8.7 (4.0)
|
Gargoyle 1.5.x Authenticated OS Command Execution via … |
Gargoyle |
Gargoyle Router Management Utility |
2025-12-31T20:48:11.986Z | 2026-01-02T14:36:00.930Z |
| CVE-2025-15223 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Philipinho Simple-PHP-Blog login.php cross site scripting |
Philipinho |
Simple-PHP-Blog |
2025-12-31T02:32:09.788Z | 2026-01-02T14:37:44.183Z |
| CVE-2025-69092 |
6.5 (3.1)
|
WordPress Essential Addons for Elementor plugin <= 6.5… |
WPDeveloper |
Essential Addons for Elementor |
2025-12-30T10:47:58.488Z | 2026-01-20T14:28:29.757Z |
| CVE-2025-69034 |
8.1 (3.1)
|
WordPress Lekker theme <= 1.8 - Local File Inclusion v… |
Mikado-Themes |
Lekker |
2025-12-30T10:47:57.680Z | 2026-01-20T14:28:29.626Z |
| CVE-2026-24910 |
5.9 (3.1)
|
In Bun before 1.3.5, the default trusted dependen… |
Bun |
Bun |
2026-01-27T22:26:26.801Z | 2026-01-28T21:19:54.515Z |
| CVE-2026-24909 |
5.9 (3.1)
|
vlt before 1.0.0-rc.10 mishandles path sanitizati… |
vlt |
vlt |
2026-01-27T22:14:37.716Z | 2026-01-28T21:18:16.797Z |
| CVE-2026-24883 |
3.7 (3.1)
|
In GnuPG before 2.5.17, a long signature packet l… |
GnuPG |
GnuPG |
2026-01-27T18:43:18.883Z | 2026-01-28T15:52:11.076Z |
| CVE-2026-24882 |
8.4 (3.1)
|
In GnuPG before 2.5.17, a stack-based buffer over… |
GnuPG |
GnuPG |
2026-01-27T18:40:18.166Z | 2026-01-28T15:45:56.231Z |
| CVE-2026-24881 |
8.1 (3.1)
|
In GnuPG before 2.5.17, a crafted CMS (S/MIME) En… |
GnuPG |
GnuPG |
2026-01-27T18:36:56.727Z | 2026-01-27T20:08:54.449Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-24881 | In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped … | 2026-01-27T19:16:16.517 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24875 | Integer Overflow or Wraparound vulnerability in yoyofr modizer.This issue affects modizer: before 4.1.1. | 2026-01-27T16:16:37.013 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24874 | Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in themrdemonized xray-… | 2026-01-27T16:16:36.880 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24873 | Out-of-bounds Read vulnerability in Rinnegatamante lpp-vita.This issue affects lpp-vita: before lpp… | 2026-01-27T16:16:36.753 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24872 | improper pointer arithmetic vulnerability in ProjectSkyfire SkyFire_548.This issue affects SkyFir… | 2026-01-27T16:16:36.640 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24871 | Improper Control of Generation of Code ('Code Injection') vulnerability in pilgrimage233 Minecraft-… | 2026-01-27T16:16:36.507 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24870 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ixray-team ixray-1.6-st… | 2026-01-27T16:16:36.377 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24850 | The ML-DSA crate is a Rust implementation of the Module-Lattice-Based Digital Signature Standard (M… | 2026-01-28T01:16:15.097 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24841 | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a criti… | 2026-01-28T01:16:14.797 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24840 | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a hardc… | 2026-01-28T01:16:14.647 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24839 | Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, the Dok… | 2026-01-28T01:16:14.490 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24838 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft … | 2026-01-28T01:16:14.350 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24837 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft … | 2026-01-28T00:15:51.050 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24836 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft … | 2026-01-28T00:15:50.910 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24833 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft … | 2026-01-28T00:15:50.773 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24832 | Out-of-bounds Write vulnerability in ixray-team ixray-1.6-stcop.This issue affects ixray-1.6-stcop:… | 2026-01-27T16:16:36.033 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24831 | Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ixray-team ixray-1.6-stcop.… | 2026-01-27T16:16:35.903 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24785 | Clatter is a no_std compatible, pure Rust implementation of the Noise protocol framework with post-… | 2026-01-28T00:15:50.623 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24784 | DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft … | 2026-01-28T00:15:50.480 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24783 | soroban-fixed-point-math is a fixed-point math library for Soroban smart contacts. In versions 1.3.… | 2026-01-27T22:15:57.433 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24771 | Hono is a Web application framework that provides support for any JavaScript runtime. Prior to vers… | 2026-01-27T20:16:24.337 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24765 | PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12… | 2026-01-27T22:15:56.790 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24748 | Kargo manages and automates the promotion of software artifacts. Prior to versions 1.8.7, 1.7.7, an… | 2026-01-27T22:15:56.630 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24741 | ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` end… | 2026-01-27T22:15:56.303 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24740 | Dozzle is a realtime log viewer for docker containers. Prior to version 9.0.3, a flaw in Dozzle’s a… | 2026-01-27T21:16:03.277 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24738 | gmrtd is a Go library for reading Machine Readable Travel Documents (MRTDs). Prior to version 0.17.… | 2026-01-27T21:16:03.117 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24736 | Squidex is an open source headless content management system and content management hub. Versions o… | 2026-01-27T21:16:02.967 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24688 | pypdf is a free and open-source pure-python PDF library. An attacker who uses an infinite loop vuln… | 2026-01-27T20:16:24.193 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24473 | Hono is a Web application framework that provides support for any JavaScript runtime. Prior to vers… | 2026-01-27T20:16:23.107 | 2026-01-29T16:31:35.700 |
| fkie_cve-2026-24472 | Hono is a Web application framework that provides support for any JavaScript runtime. Prior to vers… | 2026-01-27T20:16:22.950 | 2026-01-29T16:31:35.700 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-mqj8-8wq6-rg29 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: Fix return … | 2025-10-04T18:31:13Z | 2026-01-27T18:32:06Z |
| ghsa-5xpc-qj79-9qw9 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/mipi-dsi: Detach devices w… | 2025-10-04T18:31:13Z | 2026-01-27T18:32:06Z |
| ghsa-49r4-jvjj-q7x6 |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab… | 2025-10-04T18:31:14Z | 2026-01-27T18:32:06Z |
| ghsa-24j6-88m8-2wx3 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: coresight: cti: Fix hang in ct… | 2025-10-04T18:31:14Z | 2026-01-27T18:32:06Z |
| ghsa-x37q-qw63-qf28 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mm/kmemleak: avoid soft lockup… | 2025-09-11T18:35:50Z | 2026-01-27T18:32:05Z |
| ghsa-vwf8-rq93-5m8v |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hfs: fix slab-out-of-bounds in… | 2025-09-05T18:31:17Z | 2026-01-27T18:32:05Z |
| ghsa-v2pf-75pf-9c5h |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-leng… | 2025-09-05T18:31:26Z | 2026-01-27T18:32:05Z |
| ghsa-ph27-9pw7-jv35 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: qed: Don't collect too many pr… | 2025-10-04T09:30:21Z | 2026-01-27T18:32:05Z |
| ghsa-mhw2-58jv-2mcg |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mt76: mt7921: fix kernel panic… | 2025-09-15T15:31:29Z | 2026-01-27T18:32:05Z |
| ghsa-f84m-84r4-h992 |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bound… | 2025-09-05T18:31:17Z | 2026-01-27T18:32:05Z |
| ghsa-96vc-hjj8-mp82 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't use BUG_ON() in… | 2025-09-05T18:31:17Z | 2026-01-27T18:32:05Z |
| ghsa-88m5-rfvg-rhq2 |
4.6 (3.1)
|
Some Honor products are affected by type confusion vulnerability, successful exploitation could cau… | 2023-12-29T06:30:29Z | 2026-01-27T18:32:05Z |
| ghsa-7gg4-pr88-8256 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ext4: add EXT4_IGET_BAD flag t… | 2025-10-04T18:31:13Z | 2026-01-27T18:32:05Z |
| ghsa-5jqr-8vwq-w36c |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drbd: add missing kref_get in … | 2025-09-05T18:31:16Z | 2026-01-27T18:32:05Z |
| ghsa-3rrf-jrxv-9vpm |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: iio: light: as73211: Ensure bu… | 2025-09-05T18:31:26Z | 2026-01-27T18:32:05Z |
| ghsa-v4xf-p739-569h |
4.0 (3.1)
|
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploi… | 2023-12-29T03:30:29Z | 2026-01-27T18:32:04Z |
| ghsa-phgv-cmcv-w837 |
4.0 (3.1)
|
Some Honor products are affected by signature management vulnerability, successful exploitation cou… | 2023-12-29T03:30:28Z | 2026-01-27T18:32:04Z |
| ghsa-mh75-hrg8-8qhx |
3.3 (3.1)
|
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploi… | 2023-12-29T03:30:29Z | 2026-01-27T18:32:04Z |
| ghsa-fpr5-pmwh-c27h |
4.0 (3.1)
|
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploi… | 2023-12-29T03:30:29Z | 2026-01-27T18:32:04Z |
| ghsa-6x7c-m4cm-f7rp |
7.3 (3.1)
|
Some Honor products are affected by signature management vulnerability, successful exploitation cou… | 2023-12-29T03:30:29Z | 2026-01-27T18:32:04Z |
| ghsa-9m4g-m3p5-p6gm |
5.4 (3.1)
|
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implemen… | 2026-01-27T15:30:32Z | 2026-01-27T15:30:32Z |
| ghsa-xc99-2v4m-jv2w |
2.8 (3.1)
|
A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs b… | 2026-01-27T15:30:31Z | 2026-01-27T15:30:31Z |
| ghsa-r2rp-r5cj-6c6x |
4.2 (3.1)
|
A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to … | 2026-01-27T15:30:31Z | 2026-01-27T15:30:31Z |
| ghsa-499f-rpfh-94vx |
6.5 (3.1)
|
In ConnectWise PSA versions older than 2026.1, certain session cookies were not set with the HttpOn… | 2026-01-16T15:31:25Z | 2026-01-27T15:30:27Z |
| ghsa-vgvm-wwrq-c4xw |
5.4 (3.1)
|
An authenticated attacker granted a Viewer or Auditor role on a BIG-IQ can upload arbitrary files u… | 2023-07-06T21:14:53Z | 2026-01-27T15:30:26Z |
| ghsa-gpp2-hwq5-2xp4 |
8.7 (3.1)
|
In ConnectWise PSA versions older than 2026.1, Time Entry notes stored in the Time Entry Audit Trai… | 2026-01-16T15:31:25Z | 2026-01-27T15:30:26Z |
| ghsa-84xh-pwc6-7g4g |
4.3 (3.1)
5.3 (4.0)
|
When multiple server blocks are configured to share the same IP address and port, an attacker can u… | 2025-02-05T18:34:46Z | 2026-01-27T15:30:26Z |
| ghsa-xr9j-2jxx-p2h8 |
9.8 (3.1)
|
Integer Overflow or Wraparound vulnerability in Ralim IronOS.This issue affects IronOS: before v2.23-rc2. | 2026-01-27T12:31:18Z | 2026-01-27T12:31:18Z |
| ghsa-w299-fq8v-qvg7 |
7.5 (3.1)
|
Missing Release of Memory after Effective Lifetime vulnerability in Is-Daouda is-Engine.This issue … | 2026-01-27T12:31:18Z | 2026-01-27T12:31:18Z |
| ghsa-rx39-3p86-f4v2 |
7.5 (3.1)
|
Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affects Commander-Genius… | 2026-01-27T12:31:18Z | 2026-01-27T12:31:18Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-543 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.249240Z |
| pysec-2021-542 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.093835Z |
| pysec-2021-541 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.939983Z |
| pysec-2021-540 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.791095Z |
| pysec-2021-539 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.643127Z |
| pysec-2021-538 |
|
TensorFlow is an end-to-end open source platform for machine learning. The validation in … | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.479412Z |
| pysec-2021-537 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.330206Z |
| pysec-2021-536 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.179664Z |
| pysec-2021-535 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:00.010376Z |
| pysec-2021-534 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.860176Z |
| pysec-2021-533 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite code fo… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.713113Z |
| pysec-2021-532 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.535781Z |
| pysec-2021-531 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.386976Z |
| pysec-2021-530 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.232371Z |
| pysec-2021-529 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:59.076380Z |
| pysec-2021-528 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.930299Z |
| pysec-2021-527 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.781489Z |
| pysec-2021-526 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.584252Z |
| pysec-2021-525 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.435866Z |
| pysec-2021-524 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.287349Z |
| pysec-2021-523 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:58.107477Z |
| pysec-2021-522 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFLite's convoluti… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.958093Z |
| pysec-2021-521 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.775345Z |
| pysec-2021-520 |
|
TensorFlow is an end-to-end open source platform for machine learning. The fix for CVE-20… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.625576Z |
| pysec-2021-519 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFlite graphs must… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.477070Z |
| pysec-2021-518 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.326959Z |
| pysec-2021-517 |
|
TensorFlow is an end-to-end open source platform for machine learning. The reference impl… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.180094Z |
| pysec-2021-516 |
|
TensorFlow is an end-to-end open source platform for machine learning. The optimized impl… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:57.029977Z |
| pysec-2021-515 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.873016Z |
| pysec-2021-514 |
|
TensorFlow is an end-to-end open source platform for machine learning. Optimized pooling … | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:56.717383Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3843 | Insufficient data validation in Downloads in Google Chrome prior to 124.0.6367.60 allowed… | 2024-04-16T05:01:59.826978Z |
| gsd-2024-3842 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.659856Z |
| gsd-2024-3841 | Insufficient data validation in Browser Switcher in Google Chrome prior to 124.0.6367.60 … | 2024-04-16T05:01:59.600187Z |
| gsd-2024-3840 | Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124.0.6367.60… | 2024-04-16T05:01:59.576849Z |
| gsd-2024-3839 | Out of bounds read in Fonts in Google Chrome prior to 124.0.6367.60 allowed a remote atta… | 2024-04-16T05:01:59.768915Z |
| gsd-2024-3838 | Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed … | 2024-04-16T05:01:59.751203Z |
| gsd-2024-3837 | Use after free in QUIC in Google Chrome prior to 124.0.6367.60 allowed a remote attacker … | 2024-04-16T05:01:59.698787Z |
| gsd-2024-3836 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.728272Z |
| gsd-2024-3835 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.708972Z |
| gsd-2024-3834 | Use after free in Downloads in Google Chrome prior to 124.0.6367.60 allowed a remote atta… | 2024-04-16T05:01:59.771487Z |
| gsd-2024-3833 | Object corruption in WebAssembly in Google Chrome prior to 124.0.6367.60 allowed a remote… | 2024-04-16T05:01:59.817104Z |
| gsd-2024-3832 | Object corruption in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker… | 2024-04-16T05:01:59.619891Z |
| gsd-2024-3831 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.771707Z |
| gsd-2024-3830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.773549Z |
| gsd-2024-3829 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.795019Z |
| gsd-2024-3828 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.782933Z |
| gsd-2024-3827 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.512732Z |
| gsd-2024-3826 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.639957Z |
| gsd-2024-3825 | Versions of the BlazeMeter Jenkins plugin prior to 4.22 contain a flaw which results in c… | 2024-04-16T05:01:59.804817Z |
| gsd-2024-3824 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.814267Z |
| gsd-2024-3823 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.618229Z |
| gsd-2024-3822 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.503170Z |
| gsd-2024-3821 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.665218Z |
| gsd-2024-3820 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.488537Z |
| gsd-2024-3819 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.535261Z |
| gsd-2024-3818 | The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for Wor… | 2024-04-16T05:01:59.566901Z |
| gsd-2024-3817 | HashiCorp’s go-getter library is vulnerable to argument injection when executing Git to d… | 2024-04-16T05:01:59.493981Z |
| gsd-2024-3816 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.746535Z |
| gsd-2024-3815 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.825010Z |
| gsd-2024-3814 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:59.515931Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-47778 | Malicious code in k7eela (PyPI) | 2025-08-21T09:05:54Z | 2025-12-31T02:45:15Z |
| MAL-2025-47777 | Malicious code in k7eel (PyPI) | 2025-08-20T10:58:45Z | 2025-12-31T02:45:15Z |
| MAL-2025-47764 | Malicious code in etherweb3 (PyPI) | 2025-08-21T11:21:42Z | 2025-12-31T02:45:15Z |
| MAL-2025-47763 | Malicious code in enumeratiam (PyPI) | 2025-08-25T09:33:08Z | 2025-12-31T02:45:15Z |
| MAL-2025-47762 | Malicious code in electrum-bch (PyPI) | 2025-08-23T11:16:26Z | 2025-12-31T02:45:15Z |
| MAL-2025-47756 | Malicious code in datetime-zones (PyPI) | 2025-09-13T21:46:19Z | 2025-12-31T02:45:15Z |
| MAL-2025-47754 | Malicious code in consolecolornew (PyPI) | 2025-09-12T18:08:12Z | 2025-12-31T02:45:15Z |
| MAL-2025-47749 | Malicious code in brotli-python (PyPI) | 2025-09-07T18:53:07Z | 2025-12-31T02:45:15Z |
| MAL-2025-47746 | Malicious code in awesome-tools-collection (PyPI) | 2025-09-03T15:52:43Z | 2025-12-31T02:45:15Z |
| MAL-2025-47452 | Malicious code in secmeasure (PyPI) | 2025-08-03T08:15:27Z | 2025-12-31T02:45:15Z |
| MAL-2025-4222 | Malicious code in kms-tls-sdk (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| MAL-2025-4215 | Malicious code in discord-boteasy (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| MAL-2025-4213 | Malicious code in ctftestsowwy (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| MAL-2025-4207 | Malicious code in byted-torch-monitor (PyPI) | 2025-04-24T21:02:16Z | 2025-12-31T02:45:15Z |
| MAL-2025-41729 | Malicious code in raknet-testing-package (PyPI) | 2025-08-07T21:53:03Z | 2025-12-31T02:45:15Z |
| MAL-2025-41675 | Malicious code in flask-tdg-cyber (PyPI) | 2025-08-11T15:54:48Z | 2025-12-31T02:45:15Z |
| MAL-2025-41666 | Malicious code in dsidelib (PyPI) | 2025-08-03T16:49:34Z | 2025-12-31T02:45:15Z |
| MAL-2025-3742 | Malicious code in document-inference (PyPI) | 2025-05-10T11:05:49Z | 2025-12-31T02:45:15Z |
| MAL-2025-3462 | Malicious code in quicolor (PyPI) | 2025-03-25T09:28:59Z | 2025-12-31T02:45:15Z |
| MAL-2025-3451 | Malicious code in multiutils (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| MAL-2025-3450 | Malicious code in logax (PyPI) | 2025-03-18T09:49:12Z | 2025-12-31T02:45:15Z |
| MAL-2025-3441 | Malicious code in colorina (PyPI) | 2025-04-10T07:47:51Z | 2025-12-31T02:45:15Z |
| MAL-2025-2974 | Malicious code in markitanalysis (PyPI) | 2025-01-26T18:01:08Z | 2025-12-31T02:45:15Z |
| MAL-2025-2973 | Malicious code in marinff-test (PyPI) | 2025-03-02T17:05:55Z | 2025-12-31T02:45:15Z |
| MAL-2025-2967 | Malicious code in heroku-tl (PyPI) | 2025-03-08T07:34:12Z | 2025-12-31T02:45:15Z |
| MAL-2025-2937 | Malicious code in asyncaiosignal (PyPI) | 2025-02-13T13:18:05Z | 2025-12-31T02:45:15Z |
| MAL-2025-1986 | Malicious code in pxz (PyPI) | 2025-02-05T22:04:22Z | 2025-12-31T02:45:15Z |
| MAL-2025-1973 | Malicious code in example-vizsla-tutorial (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| MAL-2025-1961 | Malicious code in akatest (PyPI) | 2024-07-26T16:53:30Z | 2025-12-31T02:45:15Z |
| MAL-2025-192962 | Malicious code in rippling-cli (PyPI) | 2025-12-30T09:52:01Z | 2025-12-31T02:45:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1008 | Apache Superset: Schwachstelle ermöglicht Umgehung von Sicherheitsvorkehrungen | 2025-05-12T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0994 | Kong Insomnia: Schwachstelle ermöglicht Codeausführung | 2025-05-11T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0985 | F5 BIG-IP: Mehrere Schwachstellen | 2025-05-07T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0492 | AMD EPYC Prozessoren: Schwachstelle ermöglicht Codeausführung | 2025-03-05T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0323 | Intel Firmware: Mehrere Schwachstellen | 2025-02-11T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0186 | Red Hat Enterprise Linux (git-lfs): Schwachstelle ermöglicht Erlangen von Benutzerrechten | 2025-01-23T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0003 | Red Hat Enterprise Linux (python-requests): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-02T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0002 | OpenJPEG: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-01T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2024-3691 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2024-12-11T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1320 | PHP: Mehrere Schwachstellen | 2024-06-06T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1209 | GStreamer: Schwachstelle ermöglicht Codeausführung | 2024-05-21T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2024-0867 | PHP: Mehrere Schwachstellen | 2024-04-11T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1936 | Red Hat Enterprise Linux (libeconf): Schwachstelle ermöglicht Denial of Service | 2023-08-01T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2023-0814 | Ruby: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-03-30T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2022-1567 | PHP: Mehrere Schwachstellen | 2022-09-28T22:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2022-0154 | Xen: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2022-03-10T23:00:00.000+00:00 | 2025-05-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0997 | Apache Commons Configuration: Schwachstelle ermöglicht Denial of Service | 2025-05-11T22:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0996 | IBM Storage Scale: Mehrere Schwachstellen | 2025-05-11T22:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0993 | MongoDB: Schwachstelle ermöglicht Denial of Service | 2018-09-20T22:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0992 | MongoDB: Schwachstelle ermöglicht Denial of Service | 2017-09-10T22:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0958 | Google Chrome / Microsoft Edge: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-05-06T22:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0659 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2025-03-30T22:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0048 | FreeType: Schwachstelle ermöglicht Denial of Service | 2025-01-12T23:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2024-3685 | Mozilla Thunderbird: Schwachstelle ermöglicht Path-Traversal Angriff | 2024-12-11T23:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2024-3473 | VMware Tanzu Spring Framework: Schwachstelle ermöglicht Denial of Service | 2024-11-14T23:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1110 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-05-13T22:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2024-0886 | Oracle Virtualization: Mehrere Schwachstellen | 2024-04-16T22:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2022-2029 | BusyBox: Schwachstelle ermöglicht Denial of Service | 2021-03-25T23:00:00.000+00:00 | 2025-05-11T22:00:00.000+00:00 |
| wid-sec-w-2025-0990 | Checkmk: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-08T22:00:00.000+00:00 | 2025-05-08T22:00:00.000+00:00 |
| wid-sec-w-2025-0989 | Erlang/OTP: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-08T22:00:00.000+00:00 | 2025-05-08T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:0918 | Red Hat Security Advisory: Service Binding Operator security update | 2023-02-27T00:55:36+00:00 | 2026-02-03T21:14:16+00:00 |
| rhsa-2023:0899 | Red Hat Security Advisory: OpenShift Container Platform 4.10.53 bug fix and security update | 2023-03-01T09:00:10+00:00 | 2026-02-03T21:14:16+00:00 |
| rhsa-2023:0895 | Red Hat Security Advisory: OpenShift Container Platform 4.11.29 security update | 2023-02-28T07:39:08+00:00 | 2026-02-03T21:14:14+00:00 |
| rhsa-2023:0890 | Red Hat Security Advisory: OpenShift Container Platform 4.12.5 security update | 2023-02-28T11:59:36+00:00 | 2026-02-03T21:14:14+00:00 |
| rhsa-2023:0804 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2023-02-17T04:12:08+00:00 | 2026-02-03T21:14:14+00:00 |
| rhsa-2023:0803 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2023-02-17T03:46:17+00:00 | 2026-02-03T21:14:13+00:00 |
| rhsa-2023:0802 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2023-02-17T03:32:38+00:00 | 2026-02-03T21:14:11+00:00 |
| rhsa-2023:0795 | Red Hat Security Advisory: RHSA: Submariner 0.13.3 - security updates and bug fixes | 2023-02-15T21:46:51+00:00 | 2026-02-03T21:14:11+00:00 |
| rhsa-2023:0778 | Red Hat Security Advisory: OpenShift Container Platform 4.9.56 security update | 2023-02-22T23:49:55+00:00 | 2026-02-03T21:14:11+00:00 |
| rhsa-2023:0774 | Red Hat Security Advisory: OpenShift Container Platform 4.11.28 security update | 2023-02-21T18:11:28+00:00 | 2026-02-03T21:14:11+00:00 |
| rhsa-2023:0770 | Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update | 2023-02-20T18:30:48+00:00 | 2026-02-03T21:14:09+00:00 |
| rhsa-2023:0769 | Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update | 2023-02-20T18:30:20+00:00 | 2026-02-03T21:14:08+00:00 |
| rhsa-2023:0728 | Red Hat Security Advisory: OpenShift Container Platform 4.12.3 security update | 2023-02-16T18:18:25+00:00 | 2026-02-03T21:14:08+00:00 |
| rhsa-2023:0698 | Red Hat Security Advisory: OpenShift Container Platform 4.10.52 security update | 2023-02-15T15:43:48+00:00 | 2026-02-03T21:14:07+00:00 |
| rhsa-2023:0693 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.7 security and bug fix update | 2023-02-09T02:17:22+00:00 | 2026-02-03T21:14:07+00:00 |
| rhsa-2023:0692 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.7 security and bug fix update | 2023-02-09T01:07:26+00:00 | 2026-02-03T21:14:05+00:00 |
| rhsa-2023:0652 | Red Hat Security Advisory: OpenShift Container Platform 4.11.27 security update | 2023-02-15T05:11:15+00:00 | 2026-02-03T21:14:05+00:00 |
| rhsa-2023:0651 | Red Hat Security Advisory: OpenShift Container Platform 4.11.27 security update | 2023-02-15T07:42:48+00:00 | 2026-02-03T21:14:05+00:00 |
| rhsa-2023:0632 | Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update | 2023-02-15T11:08:43+00:00 | 2026-02-03T21:14:04+00:00 |
| rhsa-2023:0631 | Red Hat Security Advisory: RHSA: Submariner 0.14 - bug fix and security updates | 2023-02-07T17:23:40+00:00 | 2026-02-03T21:14:03+00:00 |
| rhsa-2023:0630 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.0 security and bug fix updates | 2023-02-07T18:36:08+00:00 | 2026-02-03T21:14:02+00:00 |
| rhsa-2023:0584 | Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 security update | 2023-05-18T14:27:34+00:00 | 2026-02-03T21:14:02+00:00 |
| rhsa-2023:0574 | Red Hat Security Advisory: OpenShift Container Platform 4.9.55 security update | 2023-02-13T04:31:46+00:00 | 2026-02-03T21:14:02+00:00 |
| rhsa-2023:0570 | Red Hat Security Advisory: OpenShift Container Platform 4.12.2 security update | 2023-02-07T21:22:35+00:00 | 2026-02-03T21:14:01+00:00 |
| rhsa-2023:0566 | Red Hat Security Advisory: OpenShift Container Platform 4.11.26 security update | 2023-02-07T06:18:30+00:00 | 2026-02-03T21:14:00+00:00 |
| rhsa-2023:0569 | Red Hat Security Advisory: OpenShift Container Platform 4.12.2 security update | 2023-02-07T21:23:44+00:00 | 2026-02-03T21:13:59+00:00 |
| rhsa-2023:0565 | Red Hat Security Advisory: OpenShift Container Platform 4.11.26 security update | 2023-02-07T13:22:19+00:00 | 2026-02-03T21:13:59+00:00 |
| rhsa-2023:0561 | Red Hat Security Advisory: OpenShift Container Platform 4.10.51 security update | 2023-02-08T18:49:28+00:00 | 2026-02-03T21:13:58+00:00 |
| rhsa-2023:0542 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.3.1 Containers security update | 2023-01-30T17:18:54+00:00 | 2026-02-03T21:13:57+00:00 |
| rhsa-2023:0540 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.6 security update | 2023-01-30T16:25:41+00:00 | 2026-02-03T21:13:56+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-128-01 | PTC Codebeamer | 2024-05-07T06:00:00.000000Z | 2024-05-07T06:00:00.000000Z |
| icsa-25-126-03 | BrightSign Players | 2024-05-06T06:00:00.000000Z | 2024-05-06T06:00:00.000000Z |
| icsa-24-123-02 | Delta Electronics DIAEnergie | 2024-05-02T06:00:00.000000Z | 2024-05-02T06:00:00.000000Z |
| icsa-24-067-01 | Chirp Systems Chirp Access (Update C) | 2024-03-07T07:00:00.000000Z | 2024-05-02T06:00:00.000000Z |
| icsa-24-354-02 | Hitachi Energy SDM600 | 2024-04-30T12:30:00.000000Z | 2024-04-30T12:30:00.000000Z |
| icsa-24-109-01 | Unitronics Vision Legacy series (Update A) | 2024-04-18T06:00:00.000000Z | 2024-04-30T06:00:00.000000Z |
| icsa-24-016-01 | SEW-EURODRIVE MOVITOOLS MotionStudio | 2024-01-16T07:00:00.000000Z | 2024-04-30T06:00:00.000000Z |
| icsa-24-116-04 | Honeywell Experion PKS, Experion LX, PlantCruise by Experion, Safety Manager, Safety Manager SC | 2024-04-25T06:00:00.000000Z | 2024-04-25T06:00:00.000000Z |
| icsa-24-116-01 | Hitachi Energy RTU500 Series | 2024-04-25T06:00:00.000000Z | 2024-04-25T06:00:00.000000Z |
| icsa-24-102-09 | Rockwell Automation 5015-AENFTXT (Update A) | 2024-04-11T06:00:00.000000Z | 2024-04-25T06:00:00.000000Z |
| icsa-23-143-03 | Mitsubishi Electric MELSEC Series CPU module (Update D) | 2023-05-23T06:00:00.000000Z | 2024-04-25T06:00:00.000000Z |
| icsa-24-051-03 | Mitsubishi Electric Electrical discharge machines | 2024-02-20T07:00:00.000000Z | 2024-04-23T06:00:00.000000Z |
| icsa-21-287-03 | Mitsubishi Electric MELSEC iQ-R Series | 2021-08-06T06:00:00.000000Z | 2024-04-18T06:00:00.000000Z |
| icsa-21-250-01 | Mitsubishi Electric MELSEC iQ-R Series | 2021-09-07T06:00:00.000000Z | 2024-04-18T06:00:00.000000Z |
| icsa-24-107-04 | RoboDK RoboDK | 2024-04-16T06:00:00.000000Z | 2024-04-16T06:00:00.000000Z |
| icsa-24-107-02 | Electrolink FM/DAB/TV Transmitter | 2024-04-16T06:00:00.000000Z | 2024-04-16T06:00:00.000000Z |
| icsa-24-107-01 | Measuresoft ScadaPro | 2024-04-16T06:00:00.000000Z | 2024-04-16T06:00:00.000000Z |
| icsa-24-100-01 | SUBNET PowerSYSTEM Server and Substation Server | 2024-04-09T06:00:00.000000Z | 2024-04-09T06:00:00.000000Z |
| icsa-24-102-07 | Siemens SINEC NMS | 2024-04-09T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-24-102-06 | Siemens Parasolid | 2024-04-09T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-24-102-05 | Siemens Scalance W1750D | 2024-04-09T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-24-046-01 | Siemens SCALANCE W1750D | 2024-02-13T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-23-320-05 | Siemens SCALANCE W700 | 2023-11-14T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-23-166-11 | Siemens SIMATIC S7-1500 TM MFP Linux Kernel | 2023-06-13T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-23-166-10 | Siemens SIMATIC S7-1500 TM MFP BIOS | 2023-06-13T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-23-075-04 | Siemens SCALANCE W1750D Devices | 2023-03-14T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-24-095-02 | Schweitzer Engineering Laboratories SEL 700 series relays | 2024-04-04T06:00:00.000000Z | 2024-04-04T06:00:00.000000Z |
| icsa-24-095-01 | Hitachi Energy Asset Suite 9 | 2024-04-04T06:00:00.000000Z | 2024-04-04T06:00:00.000000Z |
| icsa-24-093-01 | IOSIX IO-1020 Micro ELD | 2024-04-02T06:00:00.000000Z | 2024-04-02T06:00:00.000000Z |
| icsa-24-086-04 | Rockwell Automation FactoryTalk View ME | 2024-03-26T06:00:00.000000Z | 2024-03-26T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20190515-nxos-cmdinj-1735 | Cisco NX-OS Software Command Injection Vulnerability (CVE-2019-1735) | 2019-05-15T16:00:00+00:00 | 2021-07-12T14:24:27+00:00 |
| cisco-sa-20190515-nxos-conf-bypass | Cisco FXOS and NX-OS Software Secure Configuration Bypass Vulnerability | 2019-05-15T16:00:00+00:00 | 2021-07-12T14:24:25+00:00 |
| cisco-sa-20190515-nxos-snmp-dos | Cisco FXOS and NX-OS Software Simple Network Management Protocol Denial of Service Vulnerability | 2019-05-15T16:00:00+00:00 | 2021-07-12T14:24:24+00:00 |
| cisco-sa-broad-as-inf-disc-zuxgffxq | Cisco BroadWorks Application Server Information Disclosure Vulnerability | 2021-07-07T16:00:00+00:00 | 2021-07-09T18:17:57+00:00 |
| cisco-sa-broad-as-inf-disc-ZUXGFFXQ | Cisco BroadWorks Application Server Information Disclosure Vulnerability | 2021-07-07T16:00:00+00:00 | 2021-07-09T18:17:57+00:00 |
| cisco-sa-sdwan-vmaninfdis3-ovdr6uu8 | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-07-07T19:45:23+00:00 |
| cisco-sa-sdwan-vmaninfdis3-OvdR6uu8 | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-07-07T19:45:23+00:00 |
| cisco-sa-vvb-xss-wg4zxrp3 | Cisco Virtualized Voice Browser Cross-Site Scripting Vulnerability | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-vvb-xss-wG4zXRp3 | Cisco Virtualized Voice Browser Cross-Site Scripting Vulnerability | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-ipcamera-lldp-mem-wgqundtq | Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Memory Leak Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-ipcamera-lldp-mem-wGqundTq | Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Memory Leak Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-brcm-mxc-jul2021-26lquzuh | Broadcom MediaxChange Vulnerability Affecting Cisco Products: July 2021 | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-brcm-mxc-jul2021-26LqUZUh | Broadcom MediaxChange Vulnerability Affecting Cisco Products: July 2021 | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-bpa-priv-esc-dgubwbh4 | Cisco Business Process Automation Privilege Escalation Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-bpa-priv-esc-dgubwbH4 | Cisco Business Process Automation Privilege Escalation Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-ipcamera-lldpcdp-mem-ytqdmjro | Cisco Video Surveillance 7000 Series IP Cameras Cisco Discovery Protocol and Link Layer Discovery Protocol Memory Leak Vulnerabilities | 2021-06-02T16:00:00+00:00 | 2021-07-07T15:55:28+00:00 |
| cisco-sa-ipcamera-lldpcdp-mem-yTQDmjRO | Cisco Video Surveillance 7000 Series IP Cameras Cisco Discovery Protocol and Link Layer Discovery Protocol Memory Leak Vulnerabilities | 2021-06-02T16:00:00+00:00 | 2021-07-07T15:55:28+00:00 |
| cisco-sa-asaftd-xss-multiple-fcb3vpze | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Cross-Site Scripting Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2021-06-28T15:14:27+00:00 |
| cisco-sa-asaftd-xss-multiple-FCB3vPZe | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Cross-Site Scripting Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2021-06-28T15:14:27+00:00 |
| cisco-sa-ade-xcvaqeoz | Cisco ADE-OS Local File Inclusion Vulnerability | 2021-05-19T16:00:00+00:00 | 2021-06-24T14:24:36+00:00 |
| cisco-sa-ade-xcvAQEOZ | Cisco ADE-OS Local File Inclusion Vulnerability | 2021-05-19T16:00:00+00:00 | 2021-06-24T14:24:36+00:00 |
| cisco-sa-sdwanbo-qkcabns2 | Cisco SD-WAN Solution Buffer Overflow Vulnerability | 2020-03-18T16:00:00+00:00 | 2021-06-23T18:22:48+00:00 |
| cisco-sa-sdwanbo-QKcABnS2 | Cisco SD-WAN Solution Buffer Overflow Vulnerability | 2020-03-18T16:00:00+00:00 | 2021-06-23T18:22:48+00:00 |
| cisco-sa-sdwpresc-ysjgve9 | Cisco SD-WAN Solution Privilege Escalation Vulnerability | 2020-03-18T16:00:00+00:00 | 2021-06-23T18:09:31+00:00 |
| cisco-sa-sdwpresc-ySJGvE9 | Cisco SD-WAN Solution Privilege Escalation Vulnerability | 2020-03-18T16:00:00+00:00 | 2021-06-23T18:09:31+00:00 |
| cisco-sa-jabber-guc5mlwg | Cisco Jabber Desktop and Mobile Client Software Vulnerabilities | 2021-06-16T16:00:00+00:00 | 2021-06-17T20:25:14+00:00 |
| cisco-sa-jabber-GuC5mLwG | Cisco Jabber Desktop and Mobile Client Software Vulnerabilities | 2021-06-16T16:00:00+00:00 | 2021-06-17T20:25:14+00:00 |
| cisco-sa-meetingserver-dos-nzvwmmqt | Cisco Meeting Server API Denial of Service Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-meetingserver-dos-NzVWMMQT | Cisco Meeting Server API Denial of Service Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-esa-wsa-cert-vali-n8l97rw | Cisco Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-46817 | Lua library commands may lead to integer overflow and potential RCE | 2025-10-02T00:00:00.000Z | 2025-10-10T01:36:56.000Z |
| msrc_cve-2025-39957 | wifi: mac80211: increase scan_ies_len for S1G | 2025-10-02T00:00:00.000Z | 2025-10-10T01:02:23.000Z |
| msrc_cve-2025-39955 | tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). | 2025-10-02T00:00:00.000Z | 2025-10-10T01:02:17.000Z |
| msrc_cve-2025-39958 | iommu/s390: Make attach succeed when the device was surprise removed | 2025-10-02T00:00:00.000Z | 2025-10-10T01:02:11.000Z |
| msrc_cve-2025-8291 | ZIP64 End of Central Directory (EOCD) Locator record offset not checked | 2025-10-02T00:00:00.000Z | 2025-10-10T01:02:05.000Z |
| msrc_cve-2024-56592 | bpf: Call free_htab_elem() after htab_unlock_bucket() | 2024-12-02T00:00:00.000Z | 2025-10-10T01:01:57.000Z |
| msrc_cve-2024-53234 | erofs: handle NONHEAD !delta[1] lclusters gracefully | 2024-12-02T00:00:00.000Z | 2025-10-10T01:01:52.000Z |
| msrc_cve-2024-53220 | f2fs: fix to account dirty data in __get_secs_required() | 2024-12-02T00:00:00.000Z | 2025-10-10T01:01:46.000Z |
| msrc_cve-2024-53196 | KVM: arm64: Don't retire aborted MMIO instruction | 2024-12-02T00:00:00.000Z | 2025-10-10T01:01:40.000Z |
| msrc_cve-2024-53195 | KVM: arm64: Get rid of userspace_irqchip_in_use | 2024-12-02T00:00:00.000Z | 2025-10-10T01:01:34.000Z |
| msrc_cve-2025-59271 | Redis Enterprise Elevation of Privilege Vulnerability | 2025-10-09T07:00:00.000Z | 2025-10-09T07:00:00.000Z |
| msrc_cve-2025-59247 | Azure PlayFab Elevation of Privilege Vulnerability | 2025-10-09T07:00:00.000Z | 2025-10-09T07:00:00.000Z |
| msrc_cve-2025-59246 | Azure Entra ID Elevation of Privilege Vulnerability | 2025-10-09T07:00:00.000Z | 2025-10-09T07:00:00.000Z |
| msrc_cve-2025-59218 | Azure Entra ID Elevation of Privilege Vulnerability | 2025-10-09T07:00:00.000Z | 2025-10-09T07:00:00.000Z |
| msrc_cve-2025-55321 | Azure Monitor Log Analytics Spoofing Vulnerability | 2025-10-09T07:00:00.000Z | 2025-10-09T07:00:00.000Z |
| msrc_cve-2023-36038 | ASP.NET Core Denial of Service Vulnerability | 2023-11-14T08:00:00.000Z | 2025-10-08T07:00:00.000Z |
| msrc_cve-2025-61984 | ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.) | 2025-10-02T00:00:00.000Z | 2025-10-08T01:02:05.000Z |
| msrc_cve-2025-61985 | ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used. | 2025-10-02T00:00:00.000Z | 2025-10-08T01:02:00.000Z |
| msrc_cve-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-02T00:00:00.000Z | 2025-10-08T01:01:53.000Z |
| msrc_cve-2024-56707 | octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c | 2024-12-02T00:00:00.000Z | 2025-10-08T01:01:47.000Z |
| msrc_cve-2024-56641 | net/smc: initialize close_work early to avoid warning | 2024-12-02T00:00:00.000Z | 2025-10-08T01:01:42.000Z |
| msrc_cve-2024-40989 | KVM: arm64: Disassociate vcpus from redistributor region on teardown | 2024-07-01T07:00:00.000Z | 2025-10-08T01:01:37.000Z |
| msrc_cve-2024-40966 | tty: add the option to have a tty reject a new ldisc | 2024-07-01T07:00:00.000Z | 2025-10-08T01:01:31.000Z |
| msrc_cve-2022-48816 | SUNRPC: lock against ->sock changing during sysfs read | 2024-07-01T07:00:00.000Z | 2025-10-08T01:01:25.000Z |
| msrc_cve-2025-10729 | Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG | 2025-10-02T00:00:00.000Z | 2025-10-07T01:01:34.000Z |
| msrc_cve-2025-10728 | Uncontrolled recursion in Qt SVG module | 2025-10-02T00:00:00.000Z | 2025-10-07T01:01:25.000Z |
| msrc_cve-2025-11234 | Qemu-kvm: vnc websocket handshake use-after-free | 2025-10-02T00:00:00.000Z | 2025-10-07T01:01:16.000Z |
| msrc_cve-2022-50502 | mm: /proc/pid/smaps_rollup: fix no vma's null-deref | 2025-10-02T00:00:00.000Z | 2025-10-06T01:38:02.000Z |
| msrc_cve-2025-39947 | net/mlx5e: Harden uplink netdev access against device unbind | 2025-10-02T00:00:00.000Z | 2025-10-05T01:03:29.000Z |
| msrc_cve-2025-39944 | octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() | 2025-10-02T00:00:00.000Z | 2025-10-05T01:03:24.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14477-1 | expat-2.6.4-1.1 on GA media | 2024-11-08T00:00:00Z | 2024-11-08T00:00:00Z |
| opensuse-su-2024:14476-1 | curl-8.11.0-1.1 on GA media | 2024-11-08T00:00:00Z | 2024-11-08T00:00:00Z |
| opensuse-su-2024:14475-1 | Mesa-24.2.6-392.1 on GA media | 2024-11-08T00:00:00Z | 2024-11-08T00:00:00Z |
| opensuse-su-2024:14474-1 | ruby3.3-rubygem-puma-6.4.3-1.1 on GA media | 2024-11-07T00:00:00Z | 2024-11-07T00:00:00Z |
| opensuse-su-2024:14473-1 | ruby3.3-rubygem-actiontext-7.0-7.0.8.6-1.1 on GA media | 2024-11-07T00:00:00Z | 2024-11-07T00:00:00Z |
| opensuse-su-2024:14472-1 | ruby3.3-rubygem-actionpack-7.0-7.0.8.6-1.1 on GA media | 2024-11-07T00:00:00Z | 2024-11-07T00:00:00Z |
| opensuse-su-2024:14471-1 | ruby3.3-rubygem-actionmailer-7.0-7.0.8.6-1.1 on GA media | 2024-11-07T00:00:00Z | 2024-11-07T00:00:00Z |
| opensuse-su-2024:14470-1 | govulncheck-vulndb-0.0.20241106T172143-1.1 on GA media | 2024-11-07T00:00:00Z | 2024-11-07T00:00:00Z |
| opensuse-su-2024:14469-1 | chromedriver-130.0.6723.116-1.1 on GA media | 2024-11-07T00:00:00Z | 2024-11-07T00:00:00Z |
| opensuse-su-2024:14468-1 | IPAddress-5.5.1-1.1 on GA media | 2024-11-07T00:00:00Z | 2024-11-07T00:00:00Z |
| opensuse-su-2024:0353-1 | Security update for kmail-account-wizard | 2024-11-06T19:01:29Z | 2024-11-06T19:01:29Z |
| opensuse-su-2024:0352-1 | Security update for python-jupyterlab | 2024-11-06T19:01:24Z | 2024-11-06T19:01:24Z |
| opensuse-su-2024:0351-1 | Security update for python-mysql-connector-python | 2024-11-06T17:13:19Z | 2024-11-06T17:13:19Z |
| opensuse-su-2024:14467-1 | xwayland-24.1.4-1.1 on GA media | 2024-11-06T00:00:00Z | 2024-11-06T00:00:00Z |
| opensuse-su-2024:14466-1 | xorg-x11-server-21.1.14-1.1 on GA media | 2024-11-06T00:00:00Z | 2024-11-06T00:00:00Z |
| opensuse-su-2024:14465-1 | java-1_8_0-openjdk-1.8.0.432-1.1 on GA media | 2024-11-06T00:00:00Z | 2024-11-06T00:00:00Z |
| opensuse-su-2024:14464-1 | grub2-2.12-28.1 on GA media | 2024-11-06T00:00:00Z | 2024-11-06T00:00:00Z |
| opensuse-su-2024:0350-1 | Security update for govulncheck-vulndb | 2024-11-05T14:52:20Z | 2024-11-05T14:52:20Z |
| opensuse-su-2024:0349-1 | Security update for htmldoc | 2024-11-05T13:41:07Z | 2024-11-05T13:41:07Z |
| opensuse-su-2024:0348-1 | Security update for chromium | 2024-11-05T09:42:23Z | 2024-11-05T09:42:23Z |
| opensuse-su-2024:0347-1 | Security update for chromium | 2024-11-05T09:41:09Z | 2024-11-05T09:41:09Z |
| opensuse-su-2024:14463-1 | apache2-mod_uwsgi-2.0.28-1.1 on GA media | 2024-11-05T00:00:00Z | 2024-11-05T00:00:00Z |
| opensuse-su-2024:14462-1 | pdns-recursor-5.1.2-1.1 on GA media | 2024-11-05T00:00:00Z | 2024-11-05T00:00:00Z |
| opensuse-su-2024:14461-1 | libmozjs-128-0-128.4.0-1.1 on GA media | 2024-11-05T00:00:00Z | 2024-11-05T00:00:00Z |
| opensuse-su-2024:14460-1 | htmldoc-1.9.18-3.1 on GA media | 2024-11-05T00:00:00Z | 2024-11-05T00:00:00Z |
| opensuse-su-2024:14459-1 | qbittorrent-5.0.1-2.1 on GA media | 2024-11-04T00:00:00Z | 2024-11-04T00:00:00Z |
| opensuse-su-2024:14458-1 | govulncheck-vulndb-0.0.20241104T154416-1.1 on GA media | 2024-11-04T00:00:00Z | 2024-11-04T00:00:00Z |
| opensuse-su-2024:14457-1 | audacity-3.7.0-1.1 on GA media | 2024-11-04T00:00:00Z | 2024-11-04T00:00:00Z |
| opensuse-su-2024:14456-1 | python312-3.12.7-2.1 on GA media | 2024-11-03T00:00:00Z | 2024-11-03T00:00:00Z |
| opensuse-su-2024:14455-1 | python311-3.11.10-3.1 on GA media | 2024-11-03T00:00:00Z | 2024-11-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-superset-2021-41972 | Credentials leak | 2025-02-05T07:29:39.196Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2021-41971 | Possible SQL Injection when template processing is enabled | 2025-02-05T07:29:43.303Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2021-37839 | Improper access to dataset metadata information | 2025-02-05T07:29:47.009Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2021-32609 | XSS vulnerability on Explore page | 2025-02-05T07:29:50.701Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2021-28125 | Apache Superset Open Redirect | 2025-02-05T07:29:54.416Z | 2025-05-20T10:02:07.006Z |
| bit-superset-2021-27907 | Apache Superset stored XSS on Dashboard markdown | 2025-02-05T07:29:57.911Z | 2025-05-20T10:02:07.006Z |
| bit-sqlite-2024-0232 | Sqlite: use-after-free bug in jsonparseaddnodearray | 2024-03-06T11:05:33.362Z | 2025-05-20T10:02:07.006Z |
| bit-spark-2023-32007 | Apache Spark: Shell command injection via Spark UI | 2024-03-06T11:05:09.294Z | 2025-05-20T10:02:07.006Z |
| bit-spark-2023-22946 | Apache Spark proxy-user privilege escalation from malicious configuration class | 2024-03-06T11:05:18.484Z | 2025-05-20T10:02:07.006Z |
| bit-spark-2022-31777 | Apache Spark XSS vulnerability in log viewer UI Javascript | 2024-03-06T11:05:38.200Z | 2025-05-20T10:02:07.006Z |
| bit-spark-2021-38296 | Apache Spark Key Negotiation Vulnerability | 2024-03-06T11:05:47.504Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2024-52012 | Apache Solr: Configset upload on Windows allows arbitrary path write-access | 2025-01-29T07:20:30.008Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2024-45217 | Apache Solr: ConfigSets created during a backup restore command are trusted implicitly | 2024-10-18T07:18:24.823Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2024-45216 | Apache Solr: Authentication bypass possible using a fake URL Path ending | 2024-10-18T07:18:31.999Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2023-50386 | Apache Solr: Backup/Restore APIs allow for deployment of executables in malicious ConfigSets | 2024-03-06T11:05:01.473Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2023-50298 | Apache Solr: Solr can expose ZooKeeper credentials via Streaming Expressions | 2024-03-06T11:05:12.102Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2023-50292 | Apache Solr: Solr Schema Designer blindly "trusts" all configsets, possibly leading to RCE by unauthenticated users | 2024-03-06T11:05:21.587Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2023-50291 | Apache Solr: System Property redaction logic inconsistency can lead to leaked passwords | 2024-03-06T11:05:31.993Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2023-50290 | Apache Solr: Host environment variables are published via the Metrics API | 2024-03-06T11:05:41.373Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2021-44548 | Apache Solr information disclosure vulnerability through DataImportHandler | 2024-03-06T11:06:01.978Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2021-29943 | Apache Solr Unprivileged users may be able to perform unauthorized read/write to collections | 2024-03-06T11:06:21.010Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2021-29262 | Misapplied Zookeeper ACLs can result in leakage of configured authentication and authorization settings | 2024-03-06T11:06:30.482Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2021-27905 | SSRF vulnerability with the Replication handler | 2024-03-06T11:06:49.094Z | 2025-05-20T10:02:07.006Z |
| bit-scylladb-2023-33972 | Privilege escalation from having CREATE access on a keyspace in Scylladb | 2024-05-14T14:38:04.732Z | 2025-05-20T10:02:07.006Z |
| bit-redis-2024-51741 | Redis allows denial-of-service due to malformed ACL selectors | 2025-01-08T07:20:15.238Z | 2025-05-20T10:02:07.006Z |
| bit-redis-2024-31227 | Denial-of-service due to malformed ACL selectors in Redis | 2024-10-09T16:41:26.630Z | 2025-05-20T10:02:07.006Z |
| bit-redis-2023-45145 | Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window. | 2024-03-06T11:03:25.305Z | 2025-05-20T10:02:07.006Z |
| bit-redis-2023-41056 | Redis vulnerable to integer overflow in certain payloads | 2024-03-06T11:03:35.383Z | 2025-05-20T10:02:07.006Z |
| bit-redis-2023-41053 | Redis SORT_RO may bypass ACL configuration | 2024-03-06T11:03:44.599Z | 2025-05-20T10:02:07.006Z |
| bit-redis-2023-36824 | Heap overflow in COMMAND GETKEYS and ACL evaluation in Redis | 2024-03-06T11:03:54.180Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202405-0224 | D-Link DIR-3040 prog.cgi websSecurityHandler Memory Leak Denial-of-Service Vulnerability.… | 2024-06-07T22:57:41.073000Z |
| var-202405-0217 | D-Link DIR-2640 HTTP Referer Stack-Based Buffer Overflow Remote Code Execution Vulnerabil… | 2024-06-07T22:54:49.824000Z |
| var-202210-2081 | An Improper Input Validation vulnerability exists in Trihedral VTScada version 12.0.38 an… | 2024-06-07T22:53:10.566000Z |
| var-202402-1450 | Incorrect Privilege Assignment vulnerability in Mitsubishi Electric Corporation MELSEC iQ… | 2024-06-07T22:53:08.079000Z |
| var-200110-0292 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2024-06-07T21:31:54.786000Z |
| var-201911-0712 | An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8… | 2024-06-07T20:56:30.284000Z |
| var-200609-0707 | The FTP server in Apple Mac OS X 10.4.8 and earlier, when FTP Access is enabled, will cra… | 2024-06-07T19:51:48.462000Z |
| var-201409-1156 | GNU Bash through 4.3 processes trailing strings after function definitions in the values … | 2024-06-07T19:22:35.899000Z |
| var-200411-0128 | Heap-based buffer overflow in Dell OpenManage Web Server 3.4.0 allows remote attackers to… | 2024-06-06T23:12:44.021000Z |
| var-202307-2198 | Authentication Bypass vulnerability in D-Link DIR-885L FW102b01 allows remote attackers t… | 2024-06-06T23:11:27.436000Z |
| var-200411-0127 | Buffer overflow in Serv-U ftp before 5.0.0.4 allows remote authenticated users to execute… | 2024-06-06T23:11:25.303000Z |
| var-200411-0080 | Linksys WAP55AG 1.07 allows remote attackers with access to an SNMP read only community s… | 2024-06-06T23:10:52.028000Z |
| var-202404-2100 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical… | 2024-06-06T23:10:25.514000Z |
| var-202203-0661 | Improper neutralization of Special Elements leading to OS Command Injection vulnerability… | 2024-06-06T23:09:03.360000Z |
| var-200408-0157 | A certain ActiveX control in Symantec Norton AntiVirus 2004 allows remote attackers to ca… | 2024-06-06T23:06:44.094000Z |
| var-200407-0081 | The SYMDNS.SYS driver in Symantec Norton Internet Security and Professional 2002 through … | 2024-06-06T23:06:44.146000Z |
| var-200407-0080 | Multiple vulnerabilities in SYMDNS.SYS for Symantec Norton Internet Security and Professi… | 2024-06-06T23:06:44.205000Z |
| var-200411-0158 | The Javascript engine in Safari 1.2 and earlier allows remote attackers to cause a denial… | 2024-06-06T23:03:20.913000Z |
| var-202404-2094 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been declared as critical. … | 2024-06-06T23:01:55.408000Z |
| var-202404-0368 | A vulnerability, which was classified as critical, was found in Tenda W15E 15.11.0.14. Af… | 2024-06-06T23:01:55.473000Z |
| var-202404-0179 | A vulnerability classified as critical was found in Tenda AC500 2.0.1.9(1307). Affected b… | 2024-06-06T23:01:55.520000Z |
| var-202102-1300 | The administration web interface on Belkin Linksys WRT160NL 1.0.04.002_US_20130619 device… | 2024-06-06T23:00:56.504000Z |
| var-202309-0018 | A vulnerability, which was classified as critical, has been found in D-Link DAR-8000-10 u… | 2024-06-06T22:58:19.435000Z |
| var-202404-0389 | A vulnerability was found in Tenda W15E 15.11.0.14. It has been rated as critical. This i… | 2024-06-06T22:58:15.190000Z |
| var-202303-0412 | Cross-site scripting vulnerability in SEIKO EPSON printers/network interface Web Config a… | 2024-06-06T22:56:24.356000Z |
| var-202303-0411 | Cross-site request forgery (CSRF) vulnerability in SEIKO EPSON printers/network interface… | 2024-06-06T22:56:24.324000Z |
| var-200408-0170 | SYMNDIS.SYS in Symantec Norton Internet Security 2003 and 2004, Norton Personal Firewall … | 2024-06-06T22:56:19.338000Z |
| var-200412-0086 | The H.323 protocol agent in StoneSoft firewall engine 2.2.8 and earlier allows remote att… | 2024-06-06T22:55:00.856000Z |
| var-200408-0174 | Buffer overflow in the logging capability for the DHCP daemon (DHCPD) for ISC DHCP 3.0.1r… | 2024-06-06T22:52:01.388000Z |
| var-200412-0097 | Memory leak in Juniper JUNOS Packet Forwarding Engine (PFE) allows remote attackers to ca… | 2024-06-06T22:40:43.014000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000078 | Cybozu Garoon function "Files" vulnerable to directory traversal | 2016-05-30T16:18+09:00 | 2016-06-23T17:40+09:00 |
| jvndb-2016-000076 | Japan Connected-free Wi-Fi vulnerable to API execution | 2016-05-27T13:51+09:00 | 2016-06-23T17:38+09:00 |
| jvndb-2016-000082 | Cybozu Garoon fails to restrict access permissions | 2016-05-30T16:18+09:00 | 2016-06-23T17:35+09:00 |
| jvndb-2016-000091 | H2O use-after-free vulnerability | 2016-05-27T13:46+09:00 | 2016-06-23T17:23+09:00 |
| jvndb-2016-000100 | ETX-R vulnerable to cross-site request forgery | 2016-06-14T13:55+09:00 | 2016-06-23T17:12+09:00 |
| jvndb-2016-000084 | Cybozu Garoon vulnerable to cross-site scripting | 2016-05-30T16:18+09:00 | 2016-06-23T17:09+09:00 |
| jvndb-2016-000081 | Cybozu Garoon vulnerable to open redirect | 2016-05-30T16:18+09:00 | 2016-06-23T17:06+09:00 |
| jvndb-2016-000083 | Cybozu Garoon vulnerable to cross-site scripting | 2016-05-30T16:18+09:00 | 2016-06-23T17:05+09:00 |
| jvndb-2016-000090 | Source code of Old_GSI_Maps prior to January, 2015 vulnerable to directory traversal | 2016-05-30T14:07+09:00 | 2016-06-23T15:13+09:00 |
| jvndb-2016-000075 | NetCommons vulnerable to privilege escalation | 2016-05-26T14:30+09:00 | 2016-06-23T15:13+09:00 |
| jvndb-2014-000054 | Spring Framework vulnerable to directory traversal | 2014-06-13T12:40+09:00 | 2016-06-23T13:45+09:00 |
| jvndb-2016-000101 | ETX-R vulnerable to denial-of-service (DoS) | 2016-06-14T14:00+09:00 | 2016-06-23T12:20+09:00 |
| jvndb-2016-000073 | Trend Micro Internet Security access restriction flaw | 2016-06-02T16:18+09:00 | 2016-06-22T18:12+09:00 |
| jvndb-2016-000088 | Trend Micro Internet Security vulnerable to arbitrary script execution | 2016-06-02T16:18+09:00 | 2016-06-22T18:08+09:00 |
| jvndb-2016-000089 | Trend Micro enterprise products HTTP header injection vulnerability | 2016-06-02T16:18+09:00 | 2016-06-22T17:58+09:00 |
| jvndb-2016-000074 | Trend Micro enterprise products directory traversal vulnerability | 2016-06-02T16:18+09:00 | 2016-06-22T17:56+09:00 |
| jvndb-2016-000001 | DX Library vulnerable to buffer overflow | 2016-01-05T14:26+09:00 | 2016-06-08T18:06+09:00 |
| jvndb-2016-000072 | WebARENA formmail vulnerable to cross-site scripting | 2016-05-27T13:54+09:00 | 2016-06-08T17:47+09:00 |
| jvndb-2016-000071 | WordPress plugin "Markdown on Save Improved" vulnerable to cross-site scripting | 2016-05-25T14:37+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000070 | php-contact-form vulnerable to cross-site scripting | 2016-05-24T12:27+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000069 | MP Form Mail CGI Professional Edition vulnerable to directory traversal | 2016-05-20T14:22+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000068 | HumHub vulnerable to cross-site scripting | 2016-05-24T12:24+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000066 | Web Mailing List vulnerable to cross-site scripting | 2016-05-19T13:37+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000026 | Cybozu Office vulnerable to cross-site scripting | 2016-02-15T16:21+09:00 | 2016-06-06T15:00+09:00 |
| jvndb-2015-000152 | Cybozu Garoon vulnerable to LDAP injection | 2015-10-07T14:48+09:00 | 2016-06-02T19:15+09:00 |
| jvndb-2016-000058 | Apache Cordova fails to restrict access permissions | 2016-05-11T14:16+09:00 | 2016-06-02T17:49+09:00 |
| jvndb-2016-000063 | FileMaker server issue where PHP source code may be viewable | 2016-05-13T14:27+09:00 | 2016-06-02T09:43+09:00 |
| jvndb-2016-000064 | WordPress plugin "Ninja Forms" vulnerable to PHP object injection | 2016-05-13T14:27+09:00 | 2016-06-01T17:00+09:00 |
| jvndb-2016-000061 | WN-GDN/R3 Series does not limit authentication attempts | 2016-05-12T14:34+09:00 | 2016-06-01T16:52+09:00 |
| jvndb-2016-000062 | WN-G300R Series vulnerable to cross-site scripting | 2016-05-12T14:34+09:00 | 2016-06-01T16:48+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02834-1 | Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP4) | 2025-08-17T12:04:03Z | 2025-08-17T12:04:03Z |
| suse-su-2025:02833-1 | Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | 2025-08-17T09:03:58Z | 2025-08-17T09:03:58Z |
| suse-su-2025:02832-1 | Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3) | 2025-08-17T06:03:55Z | 2025-08-17T06:03:55Z |
| suse-su-2025:02830-1 | Security update for the Linux Kernel (Live Patch 65 for SLE 12 SP5) | 2025-08-16T17:04:00Z | 2025-08-16T17:04:00Z |
| suse-su-2025:02827-1 | Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) | 2025-08-16T13:33:47Z | 2025-08-16T13:33:47Z |
| suse-su-2025:20597-1 | Security update for systemd | 2025-08-16T11:46:10Z | 2025-08-16T11:46:10Z |
| suse-su-2025:02823-1 | Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7) | 2025-08-16T07:03:43Z | 2025-08-16T07:03:43Z |
| suse-su-2025:02821-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 2025-08-16T06:04:35Z | 2025-08-16T06:04:35Z |
| suse-su-2025:02820-1 | Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6) | 2025-08-16T05:33:54Z | 2025-08-16T05:33:54Z |
| suse-su-2025:02818-1 | Security update for apache-commons-lang3 | 2025-08-15T12:56:26Z | 2025-08-15T12:56:26Z |
| suse-su-2025:02817-1 | Security update for libavif | 2025-08-15T12:55:59Z | 2025-08-15T12:55:59Z |
| suse-su-2025:02816-1 | Security update for libavif | 2025-08-15T12:55:45Z | 2025-08-15T12:55:45Z |
| suse-su-2025:02815-1 | Security update for tiff | 2025-08-15T12:55:19Z | 2025-08-15T12:55:19Z |
| suse-su-2025:02814-1 | Security update for ruby2.5 | 2025-08-15T12:53:23Z | 2025-08-15T12:53:23Z |
| suse-su-2025:02813-1 | Recommended update for grub2 | 2025-08-15T12:53:14Z | 2025-08-15T12:53:14Z |
| suse-su-2025:02812-1 | Security update for go1.23-openssl | 2025-08-15T12:52:43Z | 2025-08-15T12:52:43Z |
| suse-su-2025:02811-1 | Security update for rust-keylime | 2025-08-15T12:51:54Z | 2025-08-15T12:51:54Z |
| suse-su-2025:02810-1 | Security update for rust-keylime | 2025-08-15T12:51:47Z | 2025-08-15T12:51:47Z |
| suse-su-2025:02809-1 | Security update for rust-keylime | 2025-08-15T12:51:37Z | 2025-08-15T12:51:37Z |
| suse-su-2025:02808-1 | Security update for podman | 2025-08-15T12:51:16Z | 2025-08-15T12:51:16Z |
| suse-su-2025:02807-1 | Security update for podman | 2025-08-15T12:50:56Z | 2025-08-15T12:50:56Z |
| suse-su-2025:02806-1 | Security update for podman | 2025-08-15T12:50:23Z | 2025-08-15T12:50:23Z |
| suse-su-2025:02803-1 | Security update for Mesa | 2025-08-14T16:33:50Z | 2025-08-14T16:33:50Z |
| suse-su-2025:02802-1 | Security update for python3 | 2025-08-14T15:10:00Z | 2025-08-14T15:10:00Z |
| suse-su-2025:02801-1 | Security update for ImageMagick | 2025-08-14T15:09:24Z | 2025-08-14T15:09:24Z |
| suse-su-2025:02797-1 | Security update for iputils | 2025-08-14T14:35:58Z | 2025-08-14T14:35:58Z |
| suse-su-2025:02796-1 | Security update for gstreamer-plugins-base | 2025-08-14T14:35:43Z | 2025-08-14T14:35:43Z |
| suse-su-2025:02795-1 | Security update for cairo | 2025-08-14T14:35:33Z | 2025-08-14T14:35:33Z |
| suse-su-2025:01326-1 | Security update for pgadmin4 | 2025-08-14T13:03:13Z | 2025-08-14T13:03:13Z |
| suse-su-2025:02383-2 | Security update for kubernetes1.26 | 2025-08-14T13:03:07Z | 2025-08-14T13:03:07Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-29336 | Tenda AC18栈缓冲区溢出漏洞 | 2024-03-15 | 2025-11-25 |
| cnvd-2025-29335 | Online Banquet Booking System跨站脚本漏洞 | 2025-07-23 | 2025-11-24 |
| cnvd-2025-29334 | Online Security Guards Hiring System跨站脚本漏洞 | 2025-07-25 | 2025-11-24 |
| cnvd-2025-29333 | Apple Xcode越界写入漏洞 | 2025-04-08 | 2025-11-24 |
| cnvd-2025-29332 | Apple Xcode边界检查不足漏洞 | 2025-11-10 | 2025-11-24 |
| cnvd-2025-29331 | Apple Xcode输入验证不足漏洞 | 2025-11-10 | 2025-11-24 |
| cnvd-2025-29330 | Apple macOS Sequoia权限问题漏洞(CNVD-2025-29330) | 2025-11-10 | 2025-11-24 |
| cnvd-2025-29329 | Apple macOS Sequoia代码签名限制不足漏洞 | 2025-11-10 | 2025-11-24 |
| cnvd-2025-29328 | Apple macOS Sequoia权限问题漏洞 | 2025-11-10 | 2025-11-24 |
| cnvd-2025-29327 | Apple macOS Sequoia权限限制不足漏洞 | 2025-11-10 | 2025-11-24 |
| cnvd-2025-29326 | Apple iOS和iPadOS信息泄露漏洞 | 2025-11-10 | 2025-11-24 |
| cnvd-2025-29325 | Apple iOS和iPadOS逻辑问题检查不足漏洞 | 2025-11-10 | 2025-11-24 |
| cnvd-2025-29324 | Apple iOS和iPadOS改进检查不足漏洞 | 2025-11-10 | 2025-11-24 |
| cnvd-2025-29323 | Apple iOS和iPadOS缓存处理不当漏洞 | 2025-11-10 | 2025-11-24 |
| cnvd-2025-29322 | D-Link DAP-1325 IPAddr堆栈缓冲区溢出远程代码执行漏洞 | 2023-10-07 | 2025-11-24 |
| cnvd-2025-29321 | D-Link DAP-1325 SetAPLanSettings网关堆栈缓冲区溢出远程代码执行漏洞 | 2023-10-07 | 2025-11-24 |
| cnvd-2025-29320 | D-Link DAP-1325 SetAPLanSettings堆栈缓冲区溢出远程代码执行漏洞 | 2023-10-07 | 2025-11-24 |
| cnvd-2025-29319 | D-Link DAP-1325 get_value_of_key栈缓冲区溢出远程代码执行漏洞 | 2023-10-07 | 2025-11-24 |
| cnvd-2025-29318 | D-Link DAP-1325 get_value_from_app堆栈缓冲区溢出远程代码执行漏洞 | 2023-10-07 | 2025-11-24 |
| cnvd-2025-29317 | D-Link DAP-1325 DeviceName命令注入远程代码执行漏洞 | 2024-07-19 | 2025-11-24 |
| cnvd-2025-29316 | D-Link DAP-1325 StaticDefaultGateway命令注入远程代码执行漏洞 | 2024-07-19 | 2025-11-24 |
| cnvd-2025-29315 | D-Link DAP-1325 StaticAddress命令注入远程代码执行漏洞 | 2024-07-19 | 2025-11-24 |
| cnvd-2025-29314 | D-Link DAP-1325 IPv6Mode命令注入远程代码执行漏洞 | 2024-07-19 | 2025-11-24 |
| cnvd-2025-29313 | D-Link DAP-1325 secondaryDNS命令注入远程代码执行漏洞 | 2024-07-19 | 2025-11-24 |
| cnvd-2025-29312 | Huawei HarmonyOS和EMUI未经授权的文件访问漏洞 | 2024-01-23 | 2025-11-24 |
| cnvd-2025-29311 | Huawei HarmonyOS和EMUI权限管理漏洞 | 2024-01-23 | 2025-11-24 |
| cnvd-2025-29310 | Huawei HarmonyOS和EMUI可信关系不准确漏洞(CNVD-2025-29310) | 2024-01-23 | 2025-11-24 |
| cnvd-2025-29309 | Huawei HarmonyOS和EMUI可信关系不准确漏洞(CNVD-2025-29309) | 2024-01-23 | 2025-11-24 |
| cnvd-2025-29308 | Huawei HarmonyOS访问控制不当漏洞 | 2024-01-23 | 2025-11-24 |
| cnvd-2025-29307 | Huawei HarmonyOS和EMUI绕过前台服务限制漏洞 | 2024-01-23 | 2025-11-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0337 | Multiples vulnérabilités dans les produits IBM | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0336 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0335 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0334 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0333 | Multiples vulnérabilités dans le noyau Linux de Debian | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0332 | Vulnérabilité dans Liferay | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0331 | Multiples vulnérabilités dans Microsoft Edge | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0330 | Vulnérabilité dans les produits Moxa | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0329 | Multiples vulnérabilités dans Tenable Nessus | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| certfr-2025-avi-0328 | Multiples vulnérabilités dans Tenable Security Center | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0327 | Vulnérabilité dans SonicWall Connect Tunnel | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0326 | Vulnérabilité dans Cisco Webex App | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0325 | Multiples vulnérabilités dans les produits Apple | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0220 | Vulnérabilité dans Mattermost Server | 2025-03-19T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0217 | Multiples vulnérabilités dans Mattermost Server | 2025-03-18T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0328 | Multiples vulnérabilités dans Tenable Security Center | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0327 | Vulnérabilité dans SonicWall Connect Tunnel | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0326 | Vulnérabilité dans Cisco Webex App | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0325 | Multiples vulnérabilités dans les produits Apple | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0220 | Vulnérabilité dans Mattermost Server | 2025-03-19T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0217 | Multiples vulnérabilités dans Mattermost Server | 2025-03-18T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0324 | Vulnérabilité dans Oracle Weblogic | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0323 | Multiples vulnérabilités dans Oracle Virtualization | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0322 | Multiples vulnérabilités dans Oracle Systems | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0321 | Multiples vulnérabilités dans Oracle PeopleSoft | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0320 | Multiples vulnérabilités dans Oracle MySQL | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0319 | Multiples vulnérabilités dans Oracle Java SE | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0318 | Multiples vulnérabilités dans Oracle Database Server | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0317 | Multiples vulnérabilités dans les produits Mozilla | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0316 | Multiples vulnérabilités dans les produits Atlassian | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |