Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-68869 |
9.8 (3.1)
|
WordPress LazyTasks plugin <= 1.4.01 - Privilege Escal… |
LazyCoders LLC |
LazyTasks |
2026-01-22T16:52:10.526Z | 2026-01-28T15:22:59.412Z |
| CVE-2025-69076 |
8.1 (3.1)
|
WordPress Modern Housewife theme <= 1.0.12 - Local Fil… |
AncoraThemes |
Modern Housewife |
2026-01-22T16:52:25.218Z | 2026-01-28T15:20:37.640Z |
| CVE-2025-69421 |
N/A
|
NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex… |
OpenSSL |
OpenSSL |
2026-01-27T16:01:26.435Z | 2026-01-28T15:19:41.794Z |
| CVE-2026-24736 |
9.1 (3.1)
|
Squidex has Server-Side Request Forgery (SSRF) Issue i… |
Squidex |
squidex |
2026-01-27T20:54:51.489Z | 2026-01-28T15:17:12.814Z |
| CVE-2025-59901 |
8.5 (4.0)
|
authenticated reflected XSS vulnerability in Sync Bree… |
Flexense |
Sync Breeze Enterprise Server |
2026-01-28T12:01:30.669Z | 2026-01-28T15:16:54.606Z |
| CVE-2026-24738 |
5.9 (4.0)
|
gmrtd ReadFile Vulnerable to Denial of Service via Exc… |
gmrtd |
gmrtd |
2026-01-27T21:08:29.392Z | 2026-01-28T15:16:31.785Z |
| CVE-2024-52337 |
5.5 (3.1)
|
Tuned: improper sanitization of `instance_name` parame… |
|
|
2024-11-26T15:21:17.538Z | 2026-01-28T15:15:17.757Z |
| CVE-2026-24741 |
8.1 (3.1)
|
ConvertX Vulnerable to Arbitrary File Deletion via Pat… |
C4illin |
ConvertX |
2026-01-27T21:11:57.295Z | 2026-01-28T15:14:23.019Z |
| CVE-2026-24525 |
5.3 (3.1)
|
WordPress CLP Varnish Cache plugin <= 1.0.2 - Broken A… |
CloudPanel |
CLP Varnish Cache |
2026-01-23T14:28:49.126Z | 2026-01-28T15:11:14.494Z |
| CVE-2026-24785 |
8 (4.0)
|
Clatter has a PSK Validity Rule Violation issue |
jmlepisto |
clatter |
2026-01-27T23:38:53.409Z | 2026-01-28T15:10:48.864Z |
| CVE-2025-55292 |
8.2 (3.1)
|
In Meshtastic, an attacker can spoof licensed amateur … |
meshtastic |
firmware |
2026-01-27T23:28:28.962Z | 2026-01-28T15:10:48.709Z |
| CVE-2026-23830 |
10 (3.1)
|
SandboxJS has Sandbox Escape via Unprotected AsyncFunc… |
nyariv |
SandboxJS |
2026-01-27T23:32:16.104Z | 2026-01-28T15:09:44.543Z |
| CVE-2026-24134 |
6.5 (3.1)
|
StudioCMS has an Authorization Bypass Through User-Con… |
withstudiocms |
studiocms |
2026-01-27T23:34:55.922Z | 2026-01-28T15:08:38.778Z |
| CVE-2026-24784 |
6.8 (3.1)
|
DotNetNuke.Core has a potential XSS vulnerability in m… |
dnnsoftware |
Dnn.Platform |
2026-01-27T23:47:41.846Z | 2026-01-28T15:06:44.527Z |
| CVE-2026-1237 |
2.1 (4.0)
|
Vulnerable cross-model authorization in juju. If … |
Canonical |
juju |
2026-01-28T15:01:46.364Z | 2026-01-28T15:06:23.120Z |
| CVE-2026-1244 |
6.4 (3.1)
|
Forms Bridge <= 4.2.5 - Authenticated (Contributor+) S… |
codeccoop |
Forms Bridge – Infinite integrations |
2026-01-28T06:43:41.879Z | 2026-01-28T15:04:11.678Z |
| CVE-2026-24838 |
9.1 (3.1)
|
DotNetNuke.Core Vulnerable to Stored XSS via Module Title |
dnnsoftware |
Dnn.Platform |
2026-01-27T23:58:33.340Z | 2026-01-28T15:03:27.676Z |
| CVE-2026-24839 |
4.7 (3.1)
|
Dokploy has a clickjacking vulnerability - Missing X-F… |
Dokploy |
dokploy |
2026-01-28T00:01:49.253Z | 2026-01-28T15:02:29.344Z |
| CVE-2026-0825 |
5.3 (3.1)
|
Database for Contact Form 7, WPforms, Elementor forms … |
crmperks |
Database for Contact Form 7, WPforms, Elementor forms |
2026-01-28T06:43:42.726Z | 2026-01-28T15:02:15.499Z |
| CVE-2026-24840 |
8 (3.1)
|
Dokploy uses hardcoded credentials in installation scr… |
Dokploy |
dokploy |
2026-01-28T00:15:57.299Z | 2026-01-28T15:01:06.280Z |
| CVE-2026-1295 |
6.4 (3.1)
|
Buy Now Plus <= 1.0.2 - Authenticated (Contributor+) S… |
supercleanse |
Stripe Payments by Buy Now Plus – Best WordPress Stripe Credit Card Payments Plugin |
2026-01-28T06:43:43.151Z | 2026-01-28T15:00:15.494Z |
| CVE-2026-24841 |
9.9 (3.1)
|
Dokploy Vulnerable to Authenticated Remote Code Execut… |
Dokploy |
dokploy |
2026-01-28T00:18:23.724Z | 2026-01-28T14:59:11.561Z |
| CVE-2026-1056 |
9.8 (3.1)
|
Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrar… |
inc2734 |
Snow Monkey Forms |
2026-01-28T12:28:36.867Z | 2026-01-28T14:58:00.639Z |
| CVE-2025-9082 |
6.4 (3.1)
|
WPBITS Addons For Elementor <= 1.8 - Authenticated (Co… |
wpbits |
WPBITS Addons For Elementor Page Builder |
2026-01-28T06:43:43.643Z | 2026-01-28T14:57:16.255Z |
| CVE-2025-14865 |
6.4 (3.1)
|
Passster – Password Protect Pages and Content <= 4.2.2… |
wpchill |
Passster – Password Protect Pages and Content |
2026-01-28T12:28:37.446Z | 2026-01-28T14:56:32.212Z |
| CVE-2026-24842 |
8.2 (3.1)
|
node-tar Vulnerable to Arbitrary File Creation/Overwri… |
isaacs |
node-tar |
2026-01-28T00:20:13.261Z | 2026-01-28T14:56:10.317Z |
| CVE-2020-36985 |
8.5 (4.0)
7.8 (3.1)
|
IP Watcher v3.0.0.30 - 'PACService.exe' Unquoted Servi… |
Gearboxcomputers |
IP Watcher |
2026-01-28T12:28:59.200Z | 2026-01-28T14:55:34.608Z |
| CVE-2025-12709 |
6.4 (3.1)
|
Interactions – Create Interactive Experiences in the B… |
bfintal |
Interactions – Create Interactive Experiences in the Block Editor |
2026-01-28T06:43:44.129Z | 2026-01-28T14:55:05.974Z |
| CVE-2026-24850 |
5.3 (3.1)
|
ML-DSA Signature Verification Accepts Signatures with … |
RustCrypto |
signatures |
2026-01-28T00:24:53.146Z | 2026-01-28T14:54:22.827Z |
| CVE-2020-36986 |
8.5 (4.0)
7.8 (3.1)
|
Prey 1.9.6 - "CronService" Unquoted Service Path |
Preyproject |
Prey |
2026-01-28T12:28:59.643Z | 2026-01-28T14:54:14.615Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-38361 |
N/A
|
drm/amd/display: Check dce_hwseq before dereferencing it |
Linux |
Linux |
2025-07-25T12:47:32.234Z | 2026-01-30T15:35:33.348Z |
| CVE-2025-38248 |
N/A
|
bridge: mcast: Fix use-after-free during router port c… |
Linux |
Linux |
2025-07-09T10:42:29.133Z | 2026-01-30T15:35:32.070Z |
| CVE-2025-38232 |
N/A
|
NFSD: fix race between nfsd registration and exports_proc |
Linux |
Linux |
2025-07-04T13:37:45.635Z | 2026-01-30T15:35:30.778Z |
| CVE-2025-38011 |
N/A
|
drm/amdgpu: csa unmap use uninterruptible lock |
Linux |
Linux |
2025-06-18T09:28:21.453Z | 2026-01-30T15:35:29.546Z |
| CVE-2025-37945 |
N/A
|
net: phy: allow MDIO bus PM ops to start/stop state ma… |
Linux |
Linux |
2025-05-20T15:58:20.841Z | 2026-01-30T15:35:28.290Z |
| CVE-2025-37926 |
N/A
|
ksmbd: fix use-after-free in ksmbd_session_rpc_open |
Linux |
Linux |
2025-05-20T15:21:53.359Z | 2026-01-30T15:35:26.745Z |
| CVE-2024-58097 |
5.5 (3.1)
|
wifi: ath11k: fix RCU stall while reaping monitor dest… |
Linux |
Linux |
2025-04-16T14:11:45.330Z | 2026-01-30T15:35:25.318Z |
| CVE-2024-26655 |
N/A
|
Fix memory leak in posix_clock_open() |
Linux |
Linux |
2024-04-01T14:58:20.433Z | 2026-01-30T15:35:23.531Z |
| CVE-2025-13919 |
4.4 (3.1)
|
Component Object Model (COM) Hijacking in Symantec End… |
Broadcom |
Symantec Endpoint Protection Windows Client |
2026-01-28T16:41:02.765Z | 2026-01-30T07:15:39.833Z |
| CVE-2026-25097 |
N/A
|
Not used | N/A | N/A | 2026-01-30T03:55:04.970Z | |
| CVE-2026-25096 |
N/A
|
Not used | N/A | N/A | 2026-01-30T03:55:05.530Z | |
| CVE-2026-25095 |
N/A
|
Not used | N/A | N/A | 2026-01-30T03:55:06.057Z | |
| CVE-2026-25094 |
N/A
|
Not used | N/A | N/A | 2026-01-30T03:55:06.552Z | |
| CVE-2026-25093 |
N/A
|
Not used | N/A | N/A | 2026-01-30T03:55:07.070Z | |
| CVE-2026-25092 |
N/A
|
Not used | N/A | N/A | 2026-01-30T03:55:07.504Z | |
| CVE-2026-25091 |
N/A
|
Not used | N/A | N/A | 2026-01-30T03:55:07.954Z | |
| CVE-2026-25090 |
N/A
|
Not used | N/A | N/A | 2026-01-30T03:55:08.397Z | |
| CVE-2025-54942 |
9.3 (4.0)
|
SUNNET Corporate Training Management System - Missing … |
SUNNET Technology Co., Ltd. |
Corporate Training Management System |
2025-08-30T03:37:02.439Z | 2026-01-30T03:38:07.756Z |
| CVE-2025-54946 |
9.3 (4.0)
|
SUNNET Corporate Training Management System - SQL Injection |
SUNNET Technology Co., Ltd. |
Corporate Training Management System |
2025-08-30T03:58:59.408Z | 2026-01-30T03:35:51.090Z |
| CVE-2025-54945 |
10 (4.0)
|
SUNNET Corporate Training Management System - External… |
SUNNET Technology Co., Ltd. |
Corporate Training Management System |
2025-08-30T03:50:54.588Z | 2026-01-30T03:36:16.021Z |
| CVE-2025-54944 |
6.9 (4.0)
|
SUNNET Corporate Training Management System - Unrestri… |
SUNNET Technology Co., Ltd. |
Corporate Training Management System |
2025-08-30T03:45:58.614Z | 2026-01-30T03:36:54.998Z |
| CVE-2025-54943 |
9.3 (4.0)
|
SUNNET Corporate Training Management System - Missing … |
SUNNET Technology Co., Ltd. |
Corporate Training Management System |
2025-08-30T03:42:00.229Z | 2026-01-30T03:37:33.679Z |
| CVE-2025-31342 |
9.3 (4.0)
|
Galaxy Software Services Vitals ESP Forum Module - Unr… |
Galaxy Software Services Corporation |
Vitals ESP |
2025-10-20T07:56:46.352Z | 2026-01-30T03:32:35.275Z |
| CVE-2025-67158 |
7.5 (3.1)
|
An authentication bypass in the /cgi-bin/jvsweb.c… |
n/a |
n/a |
2026-01-02T00:00:00.000Z | 2026-01-05T20:49:25.386Z |
| CVE-2025-67159 |
7.5 (3.1)
|
Vatilon v1.12.37-20240124 was discovered to trans… |
n/a |
n/a |
2026-01-02T00:00:00.000Z | 2026-01-06T17:41:23.284Z |
| CVE-2025-67160 |
7.5 (3.1)
|
An issue in Vatilon v1.12.37-20240124 allows atta… |
n/a |
n/a |
2026-01-02T00:00:00.000Z | 2026-01-06T17:39:54.613Z |
| CVE-2026-0618 |
6.1 (3.1)
|
Cross-site Scripting vulnerability in Devolutions… |
Devolutions |
PowerShell Universal |
2026-01-07T17:00:21.027Z | 2026-01-07T17:21:44.829Z |
| CVE-2025-61492 |
10 (3.1)
|
A command injection vulnerability in the execute_… |
n/a |
n/a |
2026-01-07T00:00:00.000Z | 2026-01-07T19:14:01.084Z |
| CVE-2025-65328 |
6.5 (3.1)
|
Mega-Fence (webgate-lib.*) 25.1.914 and prior tru… |
n/a |
n/a |
2026-01-05T00:00:00.000Z | 2026-01-05T21:08:06.488Z |
| CVE-2025-67303 |
7.5 (3.1)
|
An issue in ComfyUI-Manager prior to version 3.38… |
n/a |
n/a |
2026-01-05T00:00:00.000Z | 2026-01-05T19:11:15.458Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-38248 | In the Linux kernel, the following vulnerability has been resolved: bridge: mcast: Fix use-after-f… | 2025-07-09T11:15:26.963 | 2026-01-30T10:15:55.030 |
| fkie_cve-2025-38232 | In the Linux kernel, the following vulnerability has been resolved: NFSD: fix race between nfsd re… | 2025-07-04T14:15:32.810 | 2026-01-30T10:15:54.880 |
| fkie_cve-2025-38011 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: csa unmap use unin… | 2025-06-18T10:15:32.417 | 2026-01-30T10:15:54.747 |
| fkie_cve-2025-37945 | In the Linux kernel, the following vulnerability has been resolved: net: phy: allow MDIO bus PM op… | 2025-05-20T16:15:32.453 | 2026-01-30T10:15:54.597 |
| fkie_cve-2025-37926 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in k… | 2025-05-20T16:15:29.140 | 2026-01-30T10:15:54.440 |
| fkie_cve-2024-58097 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix RCU stall wh… | 2025-04-16T15:15:53.683 | 2026-01-30T10:15:54.143 |
| fkie_cve-2024-26655 | In the Linux kernel, the following vulnerability has been resolved: Fix memory leak in posix_clock… | 2024-04-01T15:15:49.910 | 2026-01-30T10:15:53.173 |
| fkie_cve-2025-13919 | Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susc… | 2026-01-28T17:16:06.493 | 2026-01-30T08:16:01.177 |
| fkie_cve-2026-25097 | Rejected reason: Not used | 2026-01-30T05:16:34.187 | 2026-01-30T05:16:34.187 |
| fkie_cve-2026-25096 | Rejected reason: Not used | 2026-01-30T05:16:34.120 | 2026-01-30T05:16:34.120 |
| fkie_cve-2026-25095 | Rejected reason: Not used | 2026-01-30T05:16:34.043 | 2026-01-30T05:16:34.043 |
| fkie_cve-2026-25094 | Rejected reason: Not used | 2026-01-30T05:16:33.977 | 2026-01-30T05:16:33.977 |
| fkie_cve-2026-25093 | Rejected reason: Not used | 2026-01-30T05:16:33.900 | 2026-01-30T05:16:33.900 |
| fkie_cve-2026-25092 | Rejected reason: Not used | 2026-01-30T05:16:33.820 | 2026-01-30T05:16:33.820 |
| fkie_cve-2026-25091 | Rejected reason: Not used | 2026-01-30T05:16:33.747 | 2026-01-30T05:16:33.747 |
| fkie_cve-2026-25090 | Rejected reason: Not used | 2026-01-30T05:16:33.630 | 2026-01-30T05:16:33.630 |
| fkie_cve-2025-54942 | A missing authentication for critical function vulnerability in SUNNET Corporate Training Managemen… | 2025-08-30T04:15:49.407 | 2026-01-30T05:16:12.113 |
| fkie_cve-2025-54946 | A SQL injection vulnerability in SUNNET Corporate Training Management System before 10.11 allows re… | 2025-08-30T04:15:57.823 | 2026-01-30T04:15:49.860 |
| fkie_cve-2025-54945 | An external control of file name or path vulnerability in SUNNET Corporate Training Management Syst… | 2025-08-30T04:15:57.540 | 2026-01-30T04:15:49.563 |
| fkie_cve-2025-54944 | An unrestricted upload of file with dangerous type vulnerability in SUNNET Corporate Training Manag… | 2025-08-30T04:15:56.073 | 2026-01-30T04:15:49.267 |
| fkie_cve-2025-54943 | A missing authorization vulnerability in SUNNET Corporate Training Management System before 10.11 a… | 2025-08-30T04:15:52.697 | 2026-01-30T04:15:48.950 |
| fkie_cve-2025-31342 | An unrestricted upload of file with dangerous type vulnerability in the upload file function of Gal… | 2025-10-20T08:15:32.570 | 2026-01-30T04:15:48.550 |
| fkie_cve-2025-67158 | An authentication bypass in the /cgi-bin/jvsweb.cgi endpoint of Revotech I6032W-FHW v1.0.0014 - 202… | 2026-01-02T17:16:23.310 | 2026-01-30T01:44:59.747 |
| fkie_cve-2025-67159 | Vatilon v1.12.37-20240124 was discovered to transmit user credentials in plaintext. | 2026-01-02T17:16:23.433 | 2026-01-30T01:44:46.417 |
| fkie_cve-2025-67160 | An issue in Vatilon v1.12.37-20240124 allows attackers to access sensitive directories and files vi… | 2026-01-02T17:16:23.547 | 2026-01-30T01:44:38.420 |
| fkie_cve-2026-0618 | Cross-site Scripting vulnerability in Devolutions PowerShell Universal.This issue affects Powershel… | 2026-01-07T17:16:02.127 | 2026-01-30T01:41:53.137 |
| fkie_cve-2025-61492 | A command injection vulnerability in the execute_command function of terminal-controller-mcp 0.1.7 … | 2026-01-07T18:15:51.117 | 2026-01-30T01:40:38.973 |
| fkie_cve-2025-65328 | Mega-Fence (webgate-lib.*) 25.1.914 and prior trusts the first value of the X-Forwarded-For (XFF) h… | 2026-01-05T16:15:42.763 | 2026-01-30T01:35:38.287 |
| fkie_cve-2025-67303 | An issue in ComfyUI-Manager prior to version 3.38 allowed remote attackers to potentially manipulat… | 2026-01-05T16:15:42.977 | 2026-01-30T01:31:37.653 |
| fkie_cve-2025-67315 | Cross Site Request Forgery vulnerability in Employee Leave Management System v.2.1 allows a remote … | 2026-01-05T16:15:43.097 | 2026-01-30T01:30:20.253 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-gm44-v6r8-p25m |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in AA-Team SearchAzon searchazon allows Cross Site … | 2026-01-22T18:30:39Z | 2026-01-27T21:31:43Z |
| ghsa-f25r-2j92-5mqm |
5.4 (3.1)
|
Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Cocco cocco allows … | 2026-01-22T18:30:40Z | 2026-01-27T21:31:43Z |
| ghsa-9fcm-hxf8-v4x6 |
5.9 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:40Z | 2026-01-27T21:31:43Z |
| ghsa-79q7-wj69-pjqg |
5.4 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in winkm89 teachPress teachpress allows Cross Site … | 2026-01-22T18:30:40Z | 2026-01-27T21:31:43Z |
| ghsa-74q9-gx85-44m3 |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in richardevcom Add Polylang support for Customizer… | 2026-01-22T18:30:40Z | 2026-01-27T21:31:43Z |
| ghsa-6x26-wr3f-8332 |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:39Z | 2026-01-27T21:31:43Z |
| ghsa-6p2m-8xf7-qgpf |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:40Z | 2026-01-27T21:31:43Z |
| ghsa-5v37-qm3f-mh2p |
7.1 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:39Z | 2026-01-27T21:31:43Z |
| ghsa-wxqh-5r9q-5hhf |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:39Z | 2026-01-27T21:31:42Z |
| ghsa-ww54-q5mm-h44g |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-22T18:30:37Z | 2026-01-27T21:31:42Z |
| ghsa-wgrv-6j54-h2xj |
6.5 (3.1)
|
Missing Authorization vulnerability in NSquared Simply Schedule Appointments simply-schedule-appoin… | 2026-01-22T18:30:39Z | 2026-01-27T21:31:42Z |
| ghsa-vhqg-6cjf-4jw7 |
9.1 (3.1)
|
Unrestricted Upload of File with Dangerous Type vulnerability in Xpro Xpro Elementor Addons xpro-el… | 2026-01-22T18:30:39Z | 2026-01-27T21:31:42Z |
| ghsa-v79x-27fq-r59f |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-22T18:30:39Z | 2026-01-27T21:31:42Z |
| ghsa-rjv5-9xjq-63w7 |
9.8 (3.1)
|
Unrestricted Upload of File with Dangerous Type vulnerability in blazethemes Blogzee blogzee allows… | 2026-01-22T18:30:36Z | 2026-01-27T21:31:42Z |
| ghsa-qp54-rrr2-2cx5 |
7.6 (3.1)
|
Missing Authorization vulnerability in Broadstreet Broadstreet Ads broadstreet allows Exploiting In… | 2026-01-22T18:30:39Z | 2026-01-27T21:31:42Z |
| ghsa-q9f5-85hh-g48c |
7.5 (3.1)
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Aiv… | 2026-01-22T18:30:36Z | 2026-01-27T21:31:42Z |
| ghsa-jhxx-jxcx-hxjh |
6.5 (3.1)
|
Missing Authorization vulnerability in solacewp Solace solace allows Exploiting Incorrectly Configu… | 2026-01-22T18:30:36Z | 2026-01-27T21:31:42Z |
| ghsa-j4p5-pg39-488f |
9.8 (3.1)
|
Unrestricted Upload of File with Dangerous Type vulnerability in blazethemes Blogistic blogistic al… | 2026-01-22T18:30:36Z | 2026-01-27T21:31:42Z |
| ghsa-gh9v-9mv6-p8g9 |
7.1 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:39Z | 2026-01-27T21:31:42Z |
| ghsa-9wq4-qhqp-553r |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-22T18:30:37Z | 2026-01-27T21:31:42Z |
| ghsa-75wm-q5m3-c399 |
7.5 (3.1)
|
Missing Authorization vulnerability in WPXPO PostX ultimate-post allows Exploiting Incorrectly Conf… | 2026-01-22T18:30:39Z | 2026-01-27T21:31:42Z |
| ghsa-75hf-52rg-6v76 |
7.3 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:36Z | 2026-01-27T21:31:42Z |
| ghsa-7335-mx3x-jg48 |
5.3 (3.1)
|
Missing Authorization vulnerability in Tasos Fel Civic Cookie Control civic-cookie-control-8 allows… | 2026-01-22T18:30:39Z | 2026-01-27T21:31:42Z |
| ghsa-5p48-v8rv-8f32 |
7.5 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-22T18:30:36Z | 2026-01-27T21:31:42Z |
| ghsa-4p8r-wx48-qfxr |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-22T18:30:36Z | 2026-01-27T21:31:42Z |
| ghsa-3w43-vh49-x5jp |
7.1 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:39Z | 2026-01-27T21:31:42Z |
| ghsa-3mf6-3q6q-vqgr |
7.3 (3.1)
|
Missing Authorization vulnerability in e-plugins Institutions Directory institutions-directory allo… | 2026-01-22T18:30:38Z | 2026-01-27T21:31:42Z |
| ghsa-32qq-wr5q-gh7c |
7.5 (3.1)
|
Improper Control of Generation of Code ('Code Injection') vulnerability in Beaver Builder Beaver Bu… | 2026-01-22T18:30:39Z | 2026-01-27T21:31:42Z |
| ghsa-2p99-vc9j-4p2g |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-22T18:30:37Z | 2026-01-27T21:31:42Z |
| ghsa-g7gq-qmh4-jhww |
7.3 (3.1)
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Aiv… | 2026-01-22T18:30:36Z | 2026-01-27T21:31:41Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-453 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.241877Z |
| pysec-2021-452 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.095784Z |
| pysec-2021-451 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.920888Z |
| pysec-2021-450 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `tf.raw_ops.Co… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.764419Z |
| pysec-2021-449 |
|
TensorFlow is an end-to-end open source platform for machine learning. Specifying a negat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.609278Z |
| pysec-2021-448 |
|
TensorFlow is an end-to-end open source platform for machine learning. Missing validation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.522398Z |
| pysec-2021-447 |
|
TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.373650Z |
| pysec-2021-446 |
|
TensorFlow is an end-to-end open source platform for machine learning. In eager mode (def… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.214930Z |
| pysec-2021-445 |
|
TensorFlow is an end-to-end open source platform for machine learning. A malicious user c… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.030158Z |
| pysec-2021-444 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.869282Z |
| pysec-2021-443 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.694528Z |
| pysec-2021-442 |
|
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` ar… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.524725Z |
| pysec-2021-441 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling TF operati… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.368024Z |
| pysec-2021-440 |
|
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` ar… | tensorflow-cpu | 2021-05-14T19:15:00Z | 2021-12-09T06:34:45.216617Z |
| pysec-2020-303 |
|
In TensorFlow before 1.15.2 and 2.0.1, converting a string (from Python) to a tf.float16 … | tensorflow-cpu | 2020-01-28T22:15:00Z | 2021-12-09T06:34:45.123200Z |
| pysec-2020-302 |
|
In affected versions of TensorFlow under certain cases, loading a saved model can result … | tensorflow-cpu | 2020-12-10T22:15:00Z | 2021-12-09T06:34:45.035634Z |
| pysec-2020-301 |
|
In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer rec… | tensorflow-cpu | 2020-12-10T23:15:00Z | 2021-12-09T06:34:44.825248Z |
| pysec-2020-299 |
|
In affected versions of TensorFlow the tf.raw_ops.ImmutableConst operation returns a cons… | tensorflow-cpu | 2020-12-10T23:15:00Z | 2021-12-09T06:34:44.590878Z |
| pysec-2020-298 |
|
In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not valid… | tensorflow-cpu | 2020-12-10T23:15:00Z | 2021-12-09T06:34:44.408160Z |
| pysec-2020-297 |
|
In affected versions of TensorFlow under certain cases a saved model can trigger use of u… | tensorflow-cpu | 2020-12-10T23:15:00Z | 2021-12-09T06:34:44.221678Z |
| pysec-2020-296 |
|
In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resiz… | tensorflow-cpu | 2020-10-21T21:15:00Z | 2021-12-09T06:34:44.028853Z |
| pysec-2020-295 |
|
In Tensorflow before version 2.4.0, an attacker can pass an invalid `axis` value to `tf.q… | tensorflow-cpu | 2020-10-21T21:15:00Z | 2021-12-09T06:34:43.980213Z |
| pysec-2020-294 |
|
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger … | tensorflow-cpu | 2020-09-25T19:15:00Z | 2021-12-09T06:34:43.930382Z |
| pysec-2020-293 |
|
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger … | tensorflow-cpu | 2020-09-25T19:15:00Z | 2021-12-09T06:34:43.849481Z |
| pysec-2020-292 |
|
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger … | tensorflow-cpu | 2020-09-25T19:15:00Z | 2021-12-09T06:34:43.741009Z |
| pysec-2020-291 |
|
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in… | tensorflow-cpu | 2020-09-25T19:15:00Z | 2021-12-09T06:34:43.650264Z |
| pysec-2020-290 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite sav… | tensorflow-cpu | 2020-09-25T19:15:00Z | 2021-12-09T06:34:43.437178Z |
| pysec-2020-289 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLit… | tensorflow-cpu | 2020-09-25T19:15:00Z | 2021-12-09T06:34:43.227280Z |
| pysec-2020-288 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determinin… | tensorflow-cpu | 2020-09-25T19:15:00Z | 2021-12-09T06:34:43.041754Z |
| pysec-2020-287 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python… | tensorflow-cpu | 2020-09-25T19:15:00Z | 2021-12-09T06:34:42.836592Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32579 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.726473Z |
| gsd-2024-32578 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.573173Z |
| gsd-2024-32577 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.662736Z |
| gsd-2024-32576 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.706349Z |
| gsd-2024-32575 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.582088Z |
| gsd-2024-32574 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.700589Z |
| gsd-2024-32573 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.712936Z |
| gsd-2024-32572 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.683680Z |
| gsd-2024-32571 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.653845Z |
| gsd-2024-32570 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.691332Z |
| gsd-2024-32569 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.695812Z |
| gsd-2024-32568 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.655991Z |
| gsd-2024-32567 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.652232Z |
| gsd-2024-32566 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.607741Z |
| gsd-2024-32565 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.747516Z |
| gsd-2024-32564 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.612566Z |
| gsd-2024-32563 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.670740Z |
| gsd-2024-32562 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.671923Z |
| gsd-2024-32561 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.727950Z |
| gsd-2024-32560 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.743903Z |
| gsd-2024-32559 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.570404Z |
| gsd-2024-32558 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.748207Z |
| gsd-2024-32557 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.714263Z |
| gsd-2024-32556 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.622736Z |
| gsd-2024-32555 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-16T05:01:54.697510Z |
| gsd-2024-32554 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.687433Z |
| gsd-2024-32553 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.626870Z |
| gsd-2024-32552 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-16T05:01:54.617923Z |
| gsd-2024-32551 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vuln… | 2024-04-16T05:01:54.708807Z |
| gsd-2024-32550 | Cross-Site Request Forgery (CSRF) vulnerability in BMI Adult & Kid Calculator allows Stor… | 2024-04-16T05:01:54.605868Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-191821 | Malicious code in prof-qux (PyPI) | 2025-07-26T15:02:22Z | 2025-12-31T02:45:15Z |
| MAL-2025-191819 | Malicious code in prof-qu (PyPI) | 2025-07-25T12:14:04Z | 2025-12-31T02:45:15Z |
| MAL-2025-191815 | Malicious code in pokemon-app-sdk (PyPI) | 2025-09-13T21:48:37Z | 2025-12-31T02:45:15Z |
| MAL-2025-191814 | Malicious code in perfviewer (PyPI) | 2025-11-16T21:33:31Z | 2025-12-31T02:45:15Z |
| MAL-2025-191813 | Malicious code in peptest2 (PyPI) | 2025-11-20T14:01:54Z | 2025-12-31T02:45:15Z |
| MAL-2025-191812 | Malicious code in peptest (PyPI) | 2025-11-20T11:33:54Z | 2025-12-31T02:45:15Z |
| MAL-2025-191805 | Malicious code in nspacercesolve (PyPI) | 2025-11-22T15:22:31Z | 2025-12-31T02:45:15Z |
| MAL-2025-191804 | Malicious code in notary-client (PyPI) | 2025-08-28T22:33:58Z | 2025-12-31T02:45:15Z |
| MAL-2025-191803 | Malicious code in network-utils-simple (PyPI) | 2025-02-14T23:02:49Z | 2025-12-31T02:45:15Z |
| MAL-2025-191802 | Malicious code in netmanagement (PyPI) | 2025-09-07T16:49:12Z | 2025-12-31T02:45:15Z |
| MAL-2025-191797 | Malicious code in multis (PyPI) | 2025-02-13T13:18:05Z | 2025-12-31T02:45:15Z |
| MAL-2025-191796 | Malicious code in mulaptested-pakname (PyPI) | 2025-08-28T22:36:38Z | 2025-12-31T02:45:15Z |
| MAL-2025-191791 | Malicious code in minemeld-core (PyPI) | 2025-11-14T17:22:38Z | 2025-12-31T02:45:15Z |
| MAL-2025-191789 | Malicious code in mcp-weather-full (PyPI) | 2025-11-06T08:46:54Z | 2025-12-31T02:45:15Z |
| MAL-2025-191788 | Malicious code in mcp-runcmd-server (PyPI) | 2025-10-13T07:46:53Z | 2025-12-31T02:45:15Z |
| MAL-2025-191785 | Malicious code in matlab-cli (PyPI) | 2025-05-09T08:09:20Z | 2025-12-31T02:45:15Z |
| MAL-2025-191782 | Malicious code in loggerex (PyPI) | 2025-08-01T15:57:37Z | 2025-12-31T02:45:15Z |
| MAL-2025-191780 | Malicious code in libopenblas (PyPI) | 2025-09-18T20:37:33Z | 2025-12-31T02:45:15Z |
| MAL-2025-191778 | Malicious code in kraken123 (PyPI) | 2025-08-29T12:14:53Z | 2025-12-31T02:45:15Z |
| MAL-2025-191774 | Malicious code in kertash (PyPI) | 2025-08-12T10:29:23Z | 2025-12-31T02:45:15Z |
| MAL-2025-191772 | Malicious code in kdewebhelper (PyPI) | 2025-11-20T22:25:56Z | 2025-12-31T02:45:15Z |
| MAL-2025-191769 | Malicious code in jsonschemex (PyPI) | 2025-11-24T18:30:10Z | 2025-12-31T02:45:15Z |
| MAL-2025-191765 | Malicious code in import-license-checker (PyPI) | 2025-08-26T09:33:55Z | 2025-12-31T02:45:15Z |
| MAL-2025-191760 | Malicious code in hooktest1 (PyPI) | 2025-11-23T16:26:36Z | 2025-12-31T02:45:15Z |
| MAL-2025-191745 | Malicious code in gtts-lts (PyPI) | 2025-09-15T16:44:31Z | 2025-12-31T02:45:15Z |
| MAL-2025-191744 | Malicious code in gradio-videotimeline (PyPI) | 2025-10-01T09:22:55Z | 2025-12-31T02:45:15Z |
| MAL-2025-191740 | Malicious code in gnosis-py (PyPI) | 2025-10-06T10:53:16Z | 2025-12-31T02:45:15Z |
| MAL-2025-191739 | Malicious code in giteegit (PyPI) | 2025-09-06T11:22:48Z | 2025-12-31T02:45:15Z |
| MAL-2025-191733 | Malicious code in fonafx (PyPI) | 2025-07-04T09:57:46Z | 2025-12-31T02:45:15Z |
| MAL-2025-191732 | Malicious code in flask-tdg-cyberx (PyPI) | 2025-08-17T19:39:48Z | 2025-12-31T02:45:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-1744 | Ruby REXML: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-07-31T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2024-1720 | Ruby REXML: Schwachstelle ermöglicht Denial of Service | 2024-07-28T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2024-0005 | QEMU: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-01-02T23:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0942 | OpenBSD: Schwachstelle ermöglicht Denial of Service | 2025-05-05T22:00:00.000+00:00 | 2025-05-05T22:00:00.000+00:00 |
| wid-sec-w-2025-0941 | PyTorch: Schwachstelle ermöglicht Denial of Service | 2025-05-05T22:00:00.000+00:00 | 2025-05-05T22:00:00.000+00:00 |
| wid-sec-w-2025-0940 | BeyondTrust Privileged Remote Access: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-05T22:00:00.000+00:00 | 2025-05-05T22:00:00.000+00:00 |
| wid-sec-w-2025-0939 | IGEL OS: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-05T22:00:00.000+00:00 | 2025-05-05T22:00:00.000+00:00 |
| wid-sec-w-2025-0937 | Android Patchday Mai 2025: Mehrere Schwachstellen | 2025-05-05T22:00:00.000+00:00 | 2025-05-05T22:00:00.000+00:00 |
| wid-sec-w-2025-0936 | HCL BigFix Compliance: Mehrere Schwachstellen | 2025-05-05T22:00:00.000+00:00 | 2025-05-05T22:00:00.000+00:00 |
| wid-sec-w-2025-0906 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2025-04-29T22:00:00.000+00:00 | 2025-05-05T22:00:00.000+00:00 |
| wid-sec-w-2025-0849 | Red Hat Enterprise Linux (virtuoso-opensource): Schwachstelle ermöglicht Denial of Service | 2025-04-21T22:00:00.000+00:00 | 2025-05-05T22:00:00.000+00:00 |
| wid-sec-w-2025-0934 | poppler: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-04T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0933 | Hashicorp Vault: Mehrere Schwachstellen | 2025-05-04T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0930 | IBM Business Automation Workflow: Mehrere Schwachstellen | 2025-05-04T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0929 | Webmin: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-04T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0928 | ffmpeg: Schwachstelle ermöglicht Denial of Service | 2025-05-04T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0927 | NetApp ActiveIQ Unified Manager: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-04T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0926 | IBM MQ: Schwachstelle ermöglicht Denial of Service | 2025-05-04T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0580 | IBM License Metric Tool: Mehrere Schwachstellen | 2025-03-17T23:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0011 | ffmpeg: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-05T23:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2024-3639 | ffmpeg: Schwachstelle ermöglicht Denial of Service | 2024-12-09T23:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2024-3496 | Apache Kafka: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-11-18T23:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2023-3034 | Eclipse IDE: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-11-30T23:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2023-0239 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2023-01-31T23:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2022-1636 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-10-05T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2022-0901 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2022-08-03T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2022-0607 | Red Hat FUSE: Mehrere Schwachstellen | 2022-07-07T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2022-0288 | Red Hat OpenShift: Mehrere Schwachstellen | 2022-06-13T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2025-0925 | Microsoft Edge: Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-05-01T22:00:00.000+00:00 | 2025-05-01T22:00:00.000+00:00 |
| wid-sec-w-2025-0924 | IBM Cognos Analytics: Mehrere Schwachstellen | 2025-05-01T22:00:00.000+00:00 | 2025-05-01T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:1275 | Red Hat Security Advisory: Red Hat OpenStack Platform (etcd) security update | 2023-03-15T19:58:09+00:00 | 2026-02-03T21:14:28+00:00 |
| rhsa-2023:1270 | Red Hat Security Advisory: OpenShift Container Platform 4.12.8 security update | 2023-03-21T04:14:05+00:00 | 2026-02-03T21:14:26+00:00 |
| rhsa-2023:1181 | Red Hat Security Advisory: Release of OpenShift Serverless 1.27.1 | 2023-03-09T16:23:44+00:00 | 2026-02-03T21:14:26+00:00 |
| rhsa-2023:1159 | Red Hat Security Advisory: OpenShift Container Platform 4.11.31 security and extras update | 2023-03-14T02:49:51+00:00 | 2026-02-03T21:14:26+00:00 |
| rhsa-2023:1179 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.27.1 | 2023-03-09T13:46:17+00:00 | 2026-02-03T21:14:24+00:00 |
| rhsa-2023:1174 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.2 security and bug fix update | 2023-03-09T01:24:50+00:00 | 2026-02-03T21:14:24+00:00 |
| rhsa-2023:1170 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.1 security bug fix update | 2023-03-08T15:31:11+00:00 | 2026-02-03T21:14:22+00:00 |
| rhsa-2023:1158 | Red Hat Security Advisory: OpenShift Container Platform 4.11.31 bug fix and security update | 2023-03-14T11:25:55+00:00 | 2026-02-03T21:14:21+00:00 |
| rhsa-2023:1154 | Red Hat Security Advisory: OpenShift Container Platform 4.10.54 security update | 2023-03-16T03:52:08+00:00 | 2026-02-03T21:14:20+00:00 |
| rhsa-2023:1079 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (osp-director-downloader-container, osp-director-agent-container and osp-director-operator-container) security update | 2023-03-06T16:23:58+00:00 | 2026-02-03T21:14:20+00:00 |
| rhsa-2023:1042 | Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift (with security updates) | 2023-03-06T18:38:53+00:00 | 2026-02-03T21:14:20+00:00 |
| rhsa-2023:1030 | Red Hat Security Advisory: OpenShift Container Platform 4.11.30 security update | 2023-03-07T09:43:19+00:00 | 2026-02-03T21:14:18+00:00 |
| rhsa-2023:1014 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (etcd) security update | 2023-02-28T15:48:21+00:00 | 2026-02-03T21:14:18+00:00 |
| rhsa-2023:0934 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | 2023-02-28T00:50:28+00:00 | 2026-02-03T21:14:18+00:00 |
| rhsa-2023:0932 | Red Hat Security Advisory: Logging Subsystem 5.6.3 - Red Hat OpenShift | 2023-03-08T14:06:03+00:00 | 2026-02-03T21:14:18+00:00 |
| rhsa-2023:0931 | Red Hat Security Advisory: Logging Subsystem 5.4.12 - Red Hat OpenShift | 2023-03-08T17:10:49+00:00 | 2026-02-03T21:14:16+00:00 |
| rhsa-2023:0930 | Red Hat Security Advisory: Logging Subsystem 5.5.8 - Red Hat OpenShift | 2023-03-08T15:35:11+00:00 | 2026-02-03T21:14:16+00:00 |
| rhsa-2023:0918 | Red Hat Security Advisory: Service Binding Operator security update | 2023-02-27T00:55:36+00:00 | 2026-02-03T21:14:16+00:00 |
| rhsa-2023:0899 | Red Hat Security Advisory: OpenShift Container Platform 4.10.53 bug fix and security update | 2023-03-01T09:00:10+00:00 | 2026-02-03T21:14:16+00:00 |
| rhsa-2023:0895 | Red Hat Security Advisory: OpenShift Container Platform 4.11.29 security update | 2023-02-28T07:39:08+00:00 | 2026-02-03T21:14:14+00:00 |
| rhsa-2023:0890 | Red Hat Security Advisory: OpenShift Container Platform 4.12.5 security update | 2023-02-28T11:59:36+00:00 | 2026-02-03T21:14:14+00:00 |
| rhsa-2023:0804 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2023-02-17T04:12:08+00:00 | 2026-02-03T21:14:14+00:00 |
| rhsa-2023:0803 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2023-02-17T03:46:17+00:00 | 2026-02-03T21:14:13+00:00 |
| rhsa-2023:0802 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2023-02-17T03:32:38+00:00 | 2026-02-03T21:14:11+00:00 |
| rhsa-2023:0795 | Red Hat Security Advisory: RHSA: Submariner 0.13.3 - security updates and bug fixes | 2023-02-15T21:46:51+00:00 | 2026-02-03T21:14:11+00:00 |
| rhsa-2023:0778 | Red Hat Security Advisory: OpenShift Container Platform 4.9.56 security update | 2023-02-22T23:49:55+00:00 | 2026-02-03T21:14:11+00:00 |
| rhsa-2023:0774 | Red Hat Security Advisory: OpenShift Container Platform 4.11.28 security update | 2023-02-21T18:11:28+00:00 | 2026-02-03T21:14:11+00:00 |
| rhsa-2023:0770 | Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update | 2023-02-20T18:30:48+00:00 | 2026-02-03T21:14:09+00:00 |
| rhsa-2023:0769 | Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update | 2023-02-20T18:30:20+00:00 | 2026-02-03T21:14:08+00:00 |
| rhsa-2023:0728 | Red Hat Security Advisory: OpenShift Container Platform 4.12.3 security update | 2023-02-16T18:18:25+00:00 | 2026-02-03T21:14:08+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-011-04 | Horner Automation Cscape | 2024-01-11T07:00:00.000000Z | 2024-01-11T07:00:00.000000Z |
| icsa-24-011-03 | Rapid Software LLC Rapid SCADA | 2024-01-11T07:00:00.000000Z | 2024-01-11T07:00:00.000000Z |
| icsa-23-348-01 | Cambium ePMP 5GHz Force 300-25 Radio (Update A) | 2023-12-14T07:00:00.000000Z | 2024-01-09T07:00:00.000000Z |
| icsa-24-011-11 | Siemens Solid Edge | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| icsa-24-011-10 | Siemens SIMATIC | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| icsa-24-011-09 | Siemens SIMATIC CN 4100 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| icsa-24-011-08 | Siemens SICAM A8000 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| icsa-24-011-07 | Siemens Spectrum Power 7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| icsa-24-011-06 | Siemens Teamcenter Visualization and JT2Go | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| icsa-23-348-13 | Siemens SICAM Q100 Devices | 2023-12-12T00:00:00.000000Z | 2024-01-09T00:00:00.000000Z |
| icsa-22-314-11 | Siemens SICAM Q100 | 2022-11-08T00:00:00.000000Z | 2024-01-09T00:00:00.000000Z |
| icsa-22-104-05 | Siemens OpenSSL Vulnerabilities in Industrial Products | 2021-07-13T00:00:00.000000Z | 2024-01-09T00:00:00.000000Z |
| icsa-24-004-02 | Mitsubishi Electric Factory Automation Products | 2024-01-04T07:00:00.000000Z | 2024-01-04T07:00:00.000000Z |
| icsa-24-004-01 | Rockwell Automation FactoryTalk Activation | 2024-01-04T07:00:00.000000Z | 2024-01-04T07:00:00.000000Z |
| icsa-23-348-15 | Unitronics Vision and Samba Series (Update A) | 2023-12-14T07:00:00.000000Z | 2024-01-04T07:00:00.000000Z |
| icsa-23-355-02 | QNAP VioStor NVR | 2023-12-21T07:00:00.000000Z | 2023-12-21T07:00:00.000000Z |
| icsa-23-355-01 | FXC AE1021/AE1021PE | 2023-12-21T07:00:00.000000Z | 2023-12-21T07:00:00.000000Z |
| icsa-24-331-05 | Hitachi Energy RTU500 Scripting Interface | 2023-12-19T13:30:00.000000Z | 2023-12-19T13:30:00.000000Z |
| icsa-23-353-05 | EuroTel ETL3100 Radio Transmitter | 2023-12-19T07:00:00.000000Z | 2023-12-19T07:00:00.000000Z |
| icsa-23-353-04 | Open Design Alliance Drawing SDK | 2023-12-19T07:00:00.000000Z | 2023-12-19T07:00:00.000000Z |
| icsa-23-353-03 | EFACEC UC 500E | 2023-12-19T07:00:00.000000Z | 2023-12-19T07:00:00.000000Z |
| icsa-23-353-02 | EFACEC BCU 500 | 2023-12-19T07:00:00.000000Z | 2023-12-19T07:00:00.000000Z |
| icsa-23-353-01 | Subnet Solutions Inc. PowerSYSTEM Center | 2023-12-19T07:00:00.000000Z | 2023-12-19T07:00:00.000000Z |
| icsa-23-341-03 | Johnson Controls Metasys and Facility Explorer (Update A) | 2023-12-07T07:00:00.000000Z | 2023-12-19T07:00:00.000000Z |
| icsma-20-254-01 | Philips Patient Monitoring Devices (Update C) | 2020-09-10T06:00:00.000000Z | 2023-12-14T07:00:00.000000Z |
| icsa-23-348-02 | Johnson Controls Kantech Gen1 ioSmart | 2023-12-14T07:00:00.000000Z | 2023-12-14T07:00:00.000000Z |
| icsa-23-346-01 | Schneider Electric Easy UPS Online Monitoring Software | 2023-12-12T07:00:00.000000Z | 2023-12-12T07:00:00.000000Z |
| icsa-23-348-16 | Siemens SINEC INS | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| icsa-23-348-07 | Siemens SIMATIC STEP 7 (TIA Portal) | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| icsa-23-348-06 | Siemens OPC UA Implementation in SINUMERIK ONE and SINUMERIK MC | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-hyperflex-upload-ktck8ugz | Cisco HyperFlex HX Data Platform File Upload Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-07T13:44:21+00:00 |
| cisco-sa-hyperflex-upload-KtCK8Ugz | Cisco HyperFlex HX Data Platform File Upload Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-07T13:44:21+00:00 |
| cisco-sa-wsa-xss-mvjowchb | Cisco Web Security Appliance Cross-Site Scripting Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-wsa-xss-mVjOWchB | Cisco Web Security Appliance Cross-Site Scripting Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-waas-infdisc-twb4eypk | Cisco Wide Area Application Services Software Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-waas-infdisc-Twb4EypK | Cisco Wide Area Application Services Software Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-vmanage-xss-en75jxtw | Cisco SD-WAN vManage API Stored Cross-Site Scripting Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-vmanage-xss-eN75jxtW | Cisco SD-WAN vManage API Stored Cross-Site Scripting Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-vmanage-enumeration-64enndky | Cisco SD-WAN vManage HTTP Authentication User Enumeration Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-vmanage-enumeration-64eNnDKy | Cisco SD-WAN vManage HTTP Authentication User Enumeration Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-tp-rmos-fileread-pe9sl3g | Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Read Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-tp-rmos-fileread-pE9sL3g | Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Read Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sma-priv-esc-jj8zxqsc | Cisco Content Security Management Appliance Privilege Escalation Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sma-priv-esc-JJ8zxQsC | Cisco Content Security Management Appliance Privilege Escalation Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-vmanageinfdis-lkrfpbv | Cisco SD-WAN vManage Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-vmanageinfdis-LKrFpbv | Cisco SD-WAN vManage Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-privesc-qvszvupy | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-privesc-QVszVUPy | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-dos-ckn5cvqw | Cisco SD-WAN Software vDaemon Denial of Service Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-dos-Ckn5cVqW | Cisco SD-WAN Software vDaemon Denial of Service Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-arbfile-7qhd9mcn | Cisco SD-WAN Software Arbitrary File Corruption Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-arbfile-7Qhd9mCn | Cisco SD-WAN Software Arbitrary File Corruption Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdw-auth-bypass-65ayqcs2 | Cisco SD-WAN vManage Software Authentication Bypass Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdw-auth-bypass-65aYqcS2 | Cisco SD-WAN vManage Software Authentication Bypass Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sd-wan-vmanage-9vzo4gfu | Cisco SD-WAN vManage Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sd-wan-vmanage-9VZO4gfU | Cisco SD-WAN vManage Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sd-wan-vmanage-4tbynnhz | Cisco SD-WAN vManage Software Vulnerabilities | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sd-wan-vmanage-4TbynnhZ | Cisco SD-WAN vManage Software Vulnerabilities | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sb-wap-multi-zafkgxhf | Cisco Small Business 100, 300, and 500 Series Wireless Access Points Vulnerabilities | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sb-wap-multi-ZAfKGXhF | Cisco Small Business 100, 300, and 500 Series Wireless Access Points Vulnerabilities | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-32665 | Gvariant deserialisation does not match spec for non-normal data | 2023-09-01T00:00:00.000Z | 2025-10-01T23:11:31.000Z |
| msrc_cve-2023-32611 | G_variant_byteswap() can take a long time with some non-normal inputs | 2023-09-01T00:00:00.000Z | 2025-10-01T23:11:31.000Z |
| msrc_cve-2023-3117 | Rejected reason: Duplicate of CVE-2023-3390. | 2023-06-01T07:00:00.000Z | 2025-10-01T23:11:31.000Z |
| msrc_cve-2023-25761 | Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin. | 2023-02-01T00:00:00.000Z | 2025-10-01T23:11:31.000Z |
| msrc_cve-2023-25136 | OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible." | 2023-02-01T00:00:00.000Z | 2025-10-01T23:11:30.000Z |
| msrc_cve-2023-22809 | In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value. | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:30.000Z |
| msrc_cve-2023-2248 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it was the duplicate of CVE-2023-31436. | 2023-05-01T00:00:00.000Z | 2025-10-01T23:11:28.000Z |
| msrc_cve-2023-21843 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Sound). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf, 11.0.17, 17.0.5, 19.0.1; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run on | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:28.000Z |
| msrc_cve-2023-21830 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf; Oracle GraalVM Enterprise Edition: 20.3.8 and 21.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:28.000Z |
| msrc_cve-2023-0687 | A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled. | 2023-02-01T00:00:00.000Z | 2025-10-01T23:11:27.000Z |
| msrc_cve-2022-47021 | A null pointer dereference issue was discovered in functions op_get_data and op_open1 in opusfile.c in xiph opusfile 0.9 thru 0.12 allows attackers to cause denial of service or other unspecified impacts. | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:27.000Z |
| msrc_cve-2022-47015 | MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to Denial of Service. It is possible for function spider_db_mbase::print_warnings to dereference a null pointer. | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:26.000Z |
| msrc_cve-2022-45885 | An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected. | 2022-11-02T00:00:00.000Z | 2025-10-01T23:11:26.000Z |
| msrc_cve-2022-45380 | Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | 2022-11-02T00:00:00.000Z | 2025-10-01T23:11:26.000Z |
| msrc_cve-2022-43410 | Jenkins Mercurial Plugin 1251.va_b_121f184902 and earlier provides information about which jobs were triggered or scheduled for polling through its webhook endpoint, including jobs the user has no permission to access. | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:26.000Z |
| msrc_cve-2022-42969 | The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. Note: This has been disputed by multiple third parties as not being reproduceable and they argue this is not a valid vulnerability. | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:25.000Z |
| msrc_cve-2022-4285 | An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599. | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:25.000Z |
| msrc_cve-2022-41854 | Stack Overflow in Snakeyaml | 2022-11-02T00:00:00.000Z | 2025-10-01T23:11:25.000Z |
| msrc_cve-2022-4139 | An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system. | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:24.000Z |
| msrc_cve-2022-4123 | A flaw was found in Buildah. The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality. | 2022-12-02T00:00:00.000Z | 2025-10-01T23:11:24.000Z |
| msrc_cve-2022-40896 | A ReDoS issue was discovered in pygments/lexers/smithy.py in pygments through 2.15.0 via SmithyLexer. | 2023-07-01T07:00:00.000Z | 2025-10-01T23:11:24.000Z |
| msrc_cve-2022-38752 | DoS in SnakeYAML | 2022-09-02T00:00:00.000Z | 2025-10-01T23:11:23.000Z |
| msrc_cve-2022-38751 | DoS in SnakeYAML | 2022-09-02T00:00:00.000Z | 2025-10-01T23:11:23.000Z |
| msrc_cve-2022-38750 | DoS in SnakeYAML | 2022-09-02T00:00:00.000Z | 2025-10-01T23:11:23.000Z |
| msrc_cve-2022-38749 | DoS in SnakeYAML | 2022-09-02T00:00:00.000Z | 2025-10-01T23:11:23.000Z |
| msrc_cve-2022-38457 | There is an UAF vulnerability in vmwgfx driver | 2022-09-02T00:00:00.000Z | 2025-10-01T23:11:22.000Z |
| msrc_cve-2022-3715 | A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems. | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:21.000Z |
| msrc_cve-2022-3697 | A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs. | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:21.000Z |
| msrc_cve-2022-36280 | There is an out-of-bounds write vulnerability in vmwgfx driver | 2022-09-02T00:00:00.000Z | 2025-10-01T23:11:20.000Z |
| msrc_cve-2022-36069 | Poetry Argument Injection vulnerability can lead to local Code Execution | 2022-09-02T00:00:00.000Z | 2025-10-01T23:11:20.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14398-1 | xmlgraphics-fop-2.10-1.1 on GA media | 2024-10-13T00:00:00Z | 2024-10-13T00:00:00Z |
| opensuse-su-2024:14397-1 | libmozjs-128-0-128.3.1-1.1 on GA media | 2024-10-12T00:00:00Z | 2024-10-12T00:00:00Z |
| opensuse-su-2024:0331-1 | Security update for ntpd-rs | 2024-10-11T22:01:43Z | 2024-10-11T22:01:43Z |
| opensuse-su-2024:14396-1 | libwireshark18-4.4.1-1.1 on GA media | 2024-10-11T00:00:00Z | 2024-10-11T00:00:00Z |
| opensuse-su-2024:14395-1 | java-jwt-4.4.0-1.1 on GA media | 2024-10-11T00:00:00Z | 2024-10-11T00:00:00Z |
| opensuse-su-2024:14394-1 | MozillaThunderbird-128.3.1-1.1 on GA media | 2024-10-11T00:00:00Z | 2024-10-11T00:00:00Z |
| opensuse-su-2024:14393-1 | MozillaFirefox-131.0.2-1.1 on GA media | 2024-10-11T00:00:00Z | 2024-10-11T00:00:00Z |
| opensuse-su-2024:0329-1 | Security update for seamonkey | 2024-10-09T09:09:49Z | 2024-10-09T09:09:49Z |
| opensuse-su-2024:0328-1 | Security update for roundcubemail | 2024-10-09T08:01:27Z | 2024-10-09T08:01:27Z |
| opensuse-su-2024:14392-1 | trivy-0.56.1-1.1 on GA media | 2024-10-09T00:00:00Z | 2024-10-09T00:00:00Z |
| opensuse-su-2024:14391-1 | libunbound8-1.21.1-1.1 on GA media | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| opensuse-su-2024:14390-1 | podman-5.2.4-1.1 on GA media | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| opensuse-su-2024:14389-1 | liboath-devel-2.6.11.12-1.1 on GA media | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| opensuse-su-2024:14388-1 | buildah-1.37.4-1.1 on GA media | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| opensuse-su-2024:14387-1 | apache-commons-io-2.17.0-2.1 on GA media | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| opensuse-su-2024:0327-1 | Security update for chromium | 2024-10-07T09:07:07Z | 2024-10-07T09:07:07Z |
| opensuse-su-2024:14386-1 | rusty_v8-0.106.0-1.1 on GA media | 2024-10-07T00:00:00Z | 2024-10-07T00:00:00Z |
| opensuse-su-2024:14385-1 | MozillaFirefox-131.0-1.1 on GA media | 2024-10-06T00:00:00Z | 2024-10-06T00:00:00Z |
| opensuse-su-2024:14384-1 | ffmpeg-7-7.1-1.1 on GA media | 2024-10-04T00:00:00Z | 2024-10-04T00:00:00Z |
| opensuse-su-2024:14383-1 | chromedriver-129.0.6668.89-1.2 on GA media | 2024-10-04T00:00:00Z | 2024-10-04T00:00:00Z |
| opensuse-su-2024:14382-1 | opensc-0.25.1-2.1 on GA media | 2024-10-02T00:00:00Z | 2024-10-02T00:00:00Z |
| opensuse-su-2024:14381-1 | libmozjs-78-0-78.15.0-5.1 on GA media | 2024-10-02T00:00:00Z | 2024-10-02T00:00:00Z |
| opensuse-su-2024:14380-1 | libmozjs-128-0-128.2.0-2.1 on GA media | 2024-10-02T00:00:00Z | 2024-10-02T00:00:00Z |
| opensuse-su-2024:14379-1 | libmozjs-115-0-115.4.0-5.1 on GA media | 2024-10-02T00:00:00Z | 2024-10-02T00:00:00Z |
| opensuse-su-2024:14378-1 | bsdtar-3.7.6-1.1 on GA media | 2024-10-02T00:00:00Z | 2024-10-02T00:00:00Z |
| opensuse-su-2024:14377-1 | xen-4.19.0_04-1.1 on GA media | 2024-10-01T00:00:00Z | 2024-10-01T00:00:00Z |
| opensuse-su-2024:0320-1 | Security update for chromium | 2024-09-30T08:41:05Z | 2024-09-30T08:41:05Z |
| opensuse-su-2024:14376-1 | php8-8.3.12-1.1 on GA media | 2024-09-29T00:00:00Z | 2024-09-29T00:00:00Z |
| opensuse-su-2024:14375-1 | kyverno-1.12.6-1.1 on GA media | 2024-09-29T00:00:00Z | 2024-09-29T00:00:00Z |
| opensuse-su-2024:14374-1 | argocd-cli-2.12.4-1.1 on GA media | 2024-09-29T00:00:00Z | 2024-09-29T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-prestashop-2023-30839 | PrestaShop vulnerable to SQL filter bypass leading to arbitrary write requests using "SQL Manager" | 2024-03-06T11:04:31.009Z | 2025-05-20T10:02:07.006Z |
| bit-prestashop-2023-30838 | PrestaShop vulnerable to possible XSS injection through Validate::isCleanHTML method | 2024-03-06T11:04:42.793Z | 2025-05-20T10:02:07.006Z |
| bit-prestashop-2023-30545 | PrestaShop arbitrary file read vulnerability | 2024-03-06T11:04:54.270Z | 2025-05-20T10:02:07.006Z |
| bit-prestashop-2023-25170 | PrestaShop has possible CSRF token fixation | 2024-03-06T11:05:15.180Z | 2025-05-20T10:02:07.006Z |
| bit-postgresql-2025-4207 | PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation | 2025-05-10T08:51:38.412Z | 2025-05-20T10:02:07.006Z |
| bit-postgresql-2025-1094 | PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation | 2025-02-17T19:18:46.733Z | 2025-05-20T10:02:07.006Z |
| bit-postgresql-2024-7348 | PostgreSQL relation replacement during pg_dump executes arbitrary SQL | 2024-08-10T07:32:17.691Z | 2025-05-20T10:02:07.006Z |
| bit-postgresql-2024-4317 | PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks | 2024-05-24T07:31:18.950Z | 2025-05-20T10:02:07.006Z |
| bit-postgresql-2024-0985 | PostgreSQL non-owner REFRESH MATERIALIZED VIEW CONCURRENTLY executes arbitrary SQL | 2024-03-06T11:02:19.997Z | 2025-05-20T10:02:07.006Z |
| bit-postgresql-2023-39418 | Postgresql: merge fails to enforce update or select row security policies | 2024-03-06T11:03:03.384Z | 2025-05-20T10:02:07.006Z |
| bit-postgresql-2023-39417 | Postgresql: extension script @substitutions@ within quoting allow sql injection | 2024-03-06T11:03:15.187Z | 2025-05-20T10:02:07.006Z |
| bit-pillow-2021-23437 | Regular Expression Denial of Service (ReDoS) | 2024-03-06T11:05:30.378Z | 2025-05-20T10:02:07.006Z |
| bit-phpmyadmin-2022-0813 | PhpMyAdmin exposure of sensitive information | 2024-03-06T11:01:57.863Z | 2025-05-20T10:02:07.006Z |
| bit-phpmailer-2021-3603 | Inclusion of Functionality from Untrusted Control Sphere in PHPMailer/PHPMailer | 2024-03-06T11:01:27.687Z | 2025-05-20T10:02:07.006Z |
| bit-php-2024-5585 | Command injection via array-ish $command parameter of proc_open() (bypass CVE-2024-1874 fix) | 2024-06-12T07:30:26.608Z | 2025-05-20T10:02:07.006Z |
| bit-php-2024-2408 | PHP is vulnerable to the Marvin Attack | 2024-06-12T07:31:53.103Z | 2025-05-20T10:02:07.006Z |
| bit-php-2024-11235 | Reference counting in php_request_shutdown causes Use-After-Free | 2025-04-14T11:38:04.154Z | 2025-05-20T10:02:07.006Z |
| bit-php-2023-3824 | Buffer overflow and overread in phar_dir_read() | 2024-03-06T11:01:21.777Z | 2025-05-20T10:02:07.006Z |
| bit-php-2023-3823 | Security issue with external entity loading in XML without enabling it | 2024-03-06T11:01:30.975Z | 2025-05-20T10:02:07.006Z |
| bit-php-2023-3247 | Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP | 2024-03-06T11:01:40.502Z | 2025-05-20T10:02:07.006Z |
| bit-php-2023-0662 | DoS vulnerability when parsing multipart request body | 2024-03-06T11:01:51.997Z | 2025-05-20T10:02:07.006Z |
| bit-php-2023-0568 | Array overrun in common path resolve code | 2024-03-06T11:02:02.405Z | 2025-05-20T10:02:07.006Z |
| bit-php-2023-0567 | password_verify() always returns true for some invalid hashes | 2024-03-06T11:02:12.080Z | 2025-05-20T10:02:07.006Z |
| bit-php-2022-31631 | PDO::quote() may return unquoted string | 2025-02-20T10:43:06.805Z | 2025-05-20T10:02:07.006Z |
| bit-php-2022-31630 | OOB read due to insufficient input validation in imageloadfont() | 2024-03-06T11:03:29.464Z | 2025-05-20T10:02:07.006Z |
| bit-php-2022-31628 | phar wrapper can occur dos when using quine gzip file | 2024-03-06T11:03:52.876Z | 2025-05-20T10:02:07.006Z |
| bit-php-2022-31627 | Heap buffer overflow in finfo_buffer | 2024-03-06T11:04:02.496Z | 2025-05-20T10:02:07.006Z |
| bit-php-2022-31626 | mysqlnd/pdo password buffer overflow | 2024-03-06T11:04:13.773Z | 2025-05-20T10:02:07.006Z |
| bit-php-2022-31625 | Freeing unallocated memory in php_pgsql_free_params() | 2024-03-06T11:04:24.882Z | 2025-05-20T10:02:07.006Z |
| bit-php-2021-21708 | UAF due to php_filter_float() failing | 2024-03-06T11:04:32.967Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202309-0562 | It is identified a format string vulnerability in ASUS RT-AX56U V2’s iperf client functi… | 2024-06-02T23:01:22.477000Z |
| var-202405-2251 | EG3210 is a multi-service security gateway. Beijing Xingwang Ruijie Network Technology C… | 2024-06-02T23:00:26.137000Z |
| var-201901-0568 | A Improper Access Control in Fortinet FortiOS 6.0.2, 5.6.7 and before, FortiADC 6.1.0, 6.… | 2024-06-02T23:00:10.467000Z |
| var-202309-0437 | It is identified a format string vulnerability in ASUS RT-AX56U V2’s General function AP… | 2024-06-02T23:00:03.450000Z |
| var-202405-3031 | Shenzhen Tongwei Digital Technology Co., Ltd. is an international provider of video secur… | 2024-06-02T23:00:01.695000Z |
| var-202109-1682 | An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An … | 2024-06-02T22:59:43.800000Z |
| var-202405-2633 | HP DesignJet T730 is a printer. HP DesignJet T730 of HP Trading (Shanghai) Co., Ltd. has… | 2024-06-02T22:59:39.601000Z |
| var-202304-0092 | CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext stora… | 2024-06-02T22:57:47.449000Z |
| var-202309-0494 | It is identified a format string vulnerability in ASUS RT-AX56U V2. This vulnerability i… | 2024-06-02T22:57:46.723000Z |
| var-202206-1251 | Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU… | 2024-06-02T22:52:44.849000Z |
| var-202208-1663 | Delta Industrial Automation DIALink versions 1.4.0.0 and prior are vulnerable to the use … | 2024-06-02T22:52:16.286000Z |
| var-200402-0012 | Cisco Personal Assistant 1.4(1) and 1.4(2) disables password authentication when "Allow O… | 2024-06-02T22:52:00.915000Z |
| var-200411-0057 | Buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon (iLDAP.exe 3.9… | 2024-06-02T22:51:08.976000Z |
| var-202405-2830 | The Yakong Giant SCADA Monitoring Platform is a high-end industrial automation full-confi… | 2024-06-02T22:49:52.989000Z |
| var-202405-0539 | An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoice… | 2024-06-02T22:47:58.318000Z |
| var-201501-0347 | Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev.… | 2024-06-02T22:46:13.922000Z |
| var-201810-0311 | A vulnerability in Cisco Webex Teams, formerly Cisco Spark, could allow an authenticated,… | 2024-06-02T22:46:06.724000Z |
| var-202104-0753 | This issue was addressed by improved management of object lifetimes. This issue is fixed … | 2024-06-02T22:43:38.239000Z |
| var-201907-0157 | Linear eMerge E3-Series devices allow Command Injections. Linear eMerge E3 The devices in… | 2024-06-02T22:38:30.013000Z |
| var-202305-1789 | The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.… | 2024-06-02T22:35:58.867000Z |
| var-202109-1311 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-06-02T22:29:38.052000Z |
| var-202109-1420 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-06-02T22:12:32.420000Z |
| var-200412-0001 | Unknown vulnerability in Windows File Sharing for Mac OS X 10.1.5 through 10.3.2 does not… | 2024-06-02T22:12:20.089000Z |
| var-200403-0020 | Unknown vulnerability in the Mail application for Mac OS X 10.1.5 and 10.2.8 with unknown… | 2024-06-02T22:07:55.775000Z |
| var-202109-1316 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-06-02T22:03:48.228000Z |
| var-200403-0031 | Unknown vulnerability in Safari web browser in Mac OS X 10.2.8 and 10.3.2, with unknown i… | 2024-06-02T21:50:09.880000Z |
| var-200609-1247 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2024-06-02T21:48:58.560000Z |
| var-200403-0068 | Unknown vulnerability in Safari web browser for Mac OS X 10.2.8 related to "the display o… | 2024-06-02T21:40:41.691000Z |
| var-202104-0751 | A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big … | 2024-06-02T21:39:39.869000Z |
| var-200403-0071 | QuickTime Streaming Server in MacOS X 10.2.8 and 10.3.2 allows remote attackers to cause … | 2024-06-02T21:38:29.327000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2015-000200 | Welcart vulnerable to SQL injection | 2015-12-17T15:19+09:00 | 2016-01-07T15:37+09:00 |
| jvndb-2015-000199 | WinRAR may insecurely load executable files | 2015-12-17T15:19+09:00 | 2016-01-07T15:36+09:00 |
| jvndb-2015-000188 | Frame high-speed chat vulnerable to cross-site scripting | 2015-11-30T13:44+09:00 | 2016-01-07T15:34+09:00 |
| jvndb-2015-000203 | CG-WLNCM4G may behave as an open resolver | 2015-12-25T14:45+09:00 | 2016-01-07T15:32+09:00 |
| jvndb-2015-000202 | CG-WLBARAGM may behave as an open proxy | 2015-12-25T14:45+09:00 | 2016-01-07T15:32+09:00 |
| jvndb-2015-000201 | CG-WLBARGS does not properly perform authentication | 2015-12-25T14:33+09:00 | 2016-01-07T15:32+09:00 |
| jvndb-2015-000196 | Web Analytics Service vulnerable to cross-site scripting | 2015-12-08T14:29+09:00 | 2016-01-07T15:13+09:00 |
| jvndb-2015-006129 | Multiple Cross-site Scripting Vulnerabilities in EUR | 2015-12-17T16:18+09:00 | 2015-12-28T13:54+09:00 |
| jvndb-2014-000126 | QNAP QTS vulnerable to OS command injection | 2014-10-28T14:39+09:00 | 2015-12-25T13:47+09:00 |
| jvndb-2015-000124 | Apache Struts vulnerable to cross-site scripting | 2015-09-04T15:12+09:00 | 2015-12-25T13:45+09:00 |
| jvndb-2015-006054 | XML External Entity (XXE) Vulnerability in Hitachi Command Suite | 2015-12-01T15:59+09:00 | 2015-12-22T17:43+09:00 |
| jvndb-2015-000142 | Apache Cordova plugin cordova-plugin-file-transfer vulnerable to HTTP header injection | 2015-09-29T14:04+09:00 | 2015-12-21T17:45+09:00 |
| jvndb-2015-005234 | Adobe Flash Player issue where iframe contents may be overwritten | 2015-12-17T15:19+09:00 | 2015-12-17T15:19+09:00 |
| jvndb-2015-000187 | Apache Cordova vulnerable to improper application of whitelist restrictions | 2015-11-27T13:29+09:00 | 2015-11-27T13:29+09:00 |
| jvndb-2015-000182 | Kirby vulnerable to arbitrary file creation | 2015-11-17T14:21+09:00 | 2015-11-24T18:03+09:00 |
| jvndb-2015-000179 | applican vulnerable to script injection | 2015-11-17T14:20+09:00 | 2015-11-24T18:03+09:00 |
| jvndb-2015-000178 | applican vulnerable to script injection | 2015-11-17T14:20+09:00 | 2015-11-24T18:03+09:00 |
| jvndb-2015-000184 | Void vulnerable to cross-site scripting | 2015-11-20T13:38+09:00 | 2015-11-24T18:02+09:00 |
| jvndb-2015-005909 | ArcSight Management Center and ArcSight Logger vulnerable to cross-site scripting | 2015-11-20T13:31+09:00 | 2015-11-20T13:31+09:00 |
| jvndb-2015-000180 | pWebManager vulnerable to OS command injection | 2015-11-13T14:25+09:00 | 2015-11-17T16:21+09:00 |
| jvndb-2015-000177 | Apple OS X authentication issue when recovering from sleep mode | 2015-11-13T14:25+09:00 | 2015-11-17T16:15+09:00 |
| jvndb-2015-000166 | EC-CUBE vulnerable to cross-site request forgery | 2015-10-26T12:27+09:00 | 2015-11-13T19:36+09:00 |
| jvndb-2015-000159 | Party Track SDK for iOS fails to verify server certificates | 2015-10-14T15:41+09:00 | 2015-11-11T17:32+09:00 |
| jvndb-2015-000175 | ISUCON5 qualifier portal web application (eventapp) vulnerable to OS command injection | 2015-11-02T14:10+09:00 | 2015-11-11T15:33+09:00 |
| jvndb-2015-000176 | SonicWall TotalSecure TZ 100 Series vulnerable to denial-of-service (DoS) | 2015-11-06T12:30+09:00 | 2015-11-09T10:47+09:00 |
| jvndb-2015-000174 | Multiple TYPE-MOON games vulnerable to OS command injection | 2015-11-05T14:11+09:00 | 2015-11-09T10:39+09:00 |
| jvndb-2015-000170 | Enisys Gw fails to restrict access permissions | 2015-10-29T13:46+09:00 | 2015-11-02T18:05+09:00 |
| jvndb-2015-000169 | Enisys Gw vulnerable to cross-site scripting | 2015-10-29T13:46+09:00 | 2015-11-02T18:05+09:00 |
| jvndb-2015-000168 | Enisys Gw vulnerable to arbitrary file creation | 2015-10-29T13:37+09:00 | 2015-11-02T18:05+09:00 |
| jvndb-2015-000167 | Enisys Gw vulnerable to SQL injection | 2015-10-29T13:37+09:00 | 2015-11-02T18:05+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02724-1 | Security update for grub2 | 2025-08-07T09:01:39Z | 2025-08-07T09:01:39Z |
| suse-su-2025:02719-1 | Security update for libgcrypt | 2025-08-07T03:38:36Z | 2025-08-07T03:38:36Z |
| suse-su-2025:02718-1 | Security update for libarchive | 2025-08-06T13:55:09Z | 2025-08-06T13:55:09Z |
| suse-su-2025:02717-1 | Security update for python311 | 2025-08-06T13:39:47Z | 2025-08-06T13:39:47Z |
| suse-su-2025:02710-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6) | 2025-08-05T15:04:52Z | 2025-08-05T15:04:52Z |
| suse-su-2025:02708-1 | Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4) | 2025-08-05T11:34:16Z | 2025-08-05T11:34:16Z |
| suse-su-2025:02707-1 | Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3) | 2025-08-05T10:34:34Z | 2025-08-05T10:34:34Z |
| suse-su-2025:02706-1 | Security update for grub2 | 2025-08-05T10:08:31Z | 2025-08-05T10:08:31Z |
| suse-su-2025:02705-1 | Security update for grub2 | 2025-08-05T10:08:15Z | 2025-08-05T10:08:15Z |
| suse-su-2025:02704-1 | Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3) | 2025-08-05T10:04:25Z | 2025-08-05T10:04:25Z |
| suse-su-2025:02703-1 | Security update for djvulibre | 2025-08-05T09:33:05Z | 2025-08-05T09:33:05Z |
| suse-su-2025:02701-1 | Security update for python | 2025-08-05T09:32:02Z | 2025-08-05T09:32:02Z |
| suse-su-2025:02700-1 | Security update for python39 | 2025-08-05T09:31:34Z | 2025-08-05T09:31:34Z |
| suse-su-2025:02699-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) | 2025-08-05T09:04:56Z | 2025-08-05T09:04:56Z |
| suse-su-2025:02698-1 | Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5) | 2025-08-05T09:04:47Z | 2025-08-05T09:04:47Z |
| suse-su-2025:02697-1 | Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3) | 2025-08-05T09:04:38Z | 2025-08-05T09:04:38Z |
| suse-su-2025:02695-1 | Security update for djvulibre | 2025-08-05T08:08:58Z | 2025-08-05T08:08:58Z |
| suse-su-2025:02693-1 | Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6) | 2025-08-05T07:34:42Z | 2025-08-05T07:34:42Z |
| suse-su-2025:02689-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 2025-08-05T07:34:35Z | 2025-08-05T07:34:35Z |
| suse-su-2025:02691-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 2025-08-05T06:33:59Z | 2025-08-05T06:33:59Z |
| suse-su-2025:02688-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | 2025-08-04T22:50:13Z | 2025-08-04T22:50:13Z |
| suse-su-2025:02687-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) | 2025-08-04T17:04:20Z | 2025-08-04T17:04:20Z |
| suse-su-2025:02685-1 | Security update for apache2 | 2025-08-04T15:08:14Z | 2025-08-04T15:08:14Z |
| suse-su-2025:02684-1 | Security update for apache2 | 2025-08-04T15:07:21Z | 2025-08-04T15:07:21Z |
| suse-su-2025:02683-1 | Security update for apache2 | 2025-08-04T15:06:58Z | 2025-08-04T15:06:58Z |
| suse-su-2025:02682-1 | Security update for apache2 | 2025-08-04T15:06:31Z | 2025-08-04T15:06:31Z |
| suse-su-2025:02681-1 | Security update for redis | 2025-08-04T15:04:37Z | 2025-08-04T15:04:37Z |
| suse-su-2025:02680-1 | Security update for redis | 2025-08-04T15:04:09Z | 2025-08-04T15:04:09Z |
| suse-su-2025:02679-1 | Security update for redis | 2025-08-04T15:03:05Z | 2025-08-04T15:03:05Z |
| suse-su-2025:02677-1 | Security update for cairo | 2025-08-04T14:31:26Z | 2025-08-04T14:31:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-29142 | Vehicle Management print.php文件SQL注入漏洞 | 2025-08-10 | 2025-11-21 |
| cnvd-2025-29141 | Simple Online Hotel Reservation System index.php文件SQL注入漏洞 | 2025-06-27 | 2025-11-21 |
| cnvd-2025-29140 | Simple Online Hotel Reservation System edit_room.php文件SQL注入漏洞 | 2025-06-27 | 2025-11-21 |
| cnvd-2025-29139 | Simple Online Hotel Reservation System edit_query_account.php文件SQL注入漏洞 | 2025-06-27 | 2025-11-21 |
| cnvd-2025-29138 | Simple Online Hotel Reservation System add_query_reserve.php文件SQL注入漏洞 | 2025-11-18 | 2025-11-21 |
| cnvd-2025-29137 | Simple Online Hotel Reservation System edit_account.php文件SQL注入漏洞 | 2025-11-18 | 2025-11-21 |
| cnvd-2025-29136 | WordPress Like-it plugin跨站请求伪造漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29135 | WordPress Gutenify plugin跨站脚本漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29134 | WordPress everviz plugin跨站脚本漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29133 | WordPress Download Panel plugin未经授权的设置修改漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29132 | WordPress CSV to SortTable plugin跨站脚本漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29131 | WordPress Coil Web Monetization plugin跨站请求伪造漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29130 | WordPress Category and Product Woocommerce Tabs plugin文件包含漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29129 | WordPress ArtiBot Free Chat Bot for WebSites plugin跨站脚本漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29125 | Responsive Hotel Site room.php文件SQL注入漏洞 | 2024-12-04 | 2025-11-21 |
| cnvd-2025-29124 | Responsive Hotel Site newsletter.php文件SQL注入漏洞 | 2024-12-30 | 2025-11-21 |
| cnvd-2025-29123 | Responsive Hotel Site print.php页面SQL注入漏洞 | 2025-01-10 | 2025-11-21 |
| cnvd-2025-29122 | Responsive Hotel Site roomdel.php文件SQL注入漏洞 | 2025-11-12 | 2025-11-21 |
| cnvd-2025-29121 | Responsive Hotel Site roombook.php文件SQL注入漏洞 | 2025-11-12 | 2025-11-21 |
| cnvd-2025-29120 | Responsive Hotel Site reservation.php文件SQL注入漏洞 | 2025-11-12 | 2025-11-21 |
| cnvd-2025-29119 | Responsive Hotel Site newsletterdel.php文件SQL注入漏洞 | 2025-11-12 | 2025-11-21 |
| cnvd-2025-29118 | Responsive Hotel Site usersettingdel.php文件SQL注入漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29117 | Responsive Hotel Site usersetting.php文件SQL注入漏洞 | 2025-11-20 | 2025-11-21 |
| cnvd-2025-29095 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4跨站请求伪造漏洞(CNVD-2025-29095) | 2025-10-31 | 2025-11-21 |
| cnvd-2025-29094 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29094) | 2025-10-31 | 2025-11-21 |
| cnvd-2025-29093 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29093) | 2025-10-31 | 2025-11-21 |
| cnvd-2025-29092 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29092) | 2025-10-31 | 2025-11-21 |
| cnvd-2025-29091 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-29091) | 2025-10-31 | 2025-11-21 |
| cnvd-2025-28728 | WordPress插件Authors List信息泄露漏洞 | 2025-11-14 | 2025-11-21 |
| cnvd-2025-28727 | Netgear D6400远程命令执行漏洞 | 2025-07-23 | 2025-11-21 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0286 | Vulnérabilité dans Google Chrome | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0298 | Multiples vulnérabilités dans les produits Elastic | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0297 | Vulnérabilité dans Spring Cloud Config | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0296 | Multiples vulnérabilités dans Joomla! | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0295 | Multiples vulnérabilités dans Ivanti Endpoint Manager (EPM) | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0293 | Multiples vulnérabilités dans les produits Fortinet | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0292 | Multiples vulnérabilités dans les produits Adobe | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0291 | Multiples vulnérabilités dans les produits Microsoft | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0290 | Multiples vulnérabilités dans Microsoft Azure | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0289 | Vulnérabilité dans Microsoft .Net | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0288 | Multiples vulnérabilités dans Microsoft Windows | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0287 | Multiples vulnérabilités dans Microsoft Office | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| CERTFR-2025-AVI-0286 | Vulnérabilité dans Google Chrome | 2025-04-09T00:00:00.000000 | 2025-04-09T00:00:00.000000 |
| certfr-2025-avi-0284 | Multiples vulnérabilités dans les produits Siemens | 2025-04-08T00:00:00.000000 | 2025-04-08T00:00:00.000000 |
| certfr-2025-avi-0282 | Multiples vulnérabilités dans Schneider Electric ConneXium Network Manager | 2025-04-08T00:00:00.000000 | 2025-04-08T00:00:00.000000 |
| certfr-2025-avi-0281 | Multiples vulnérabilités dans Google Android | 2025-04-08T00:00:00.000000 | 2025-04-08T00:00:00.000000 |
| CERTFR-2025-AVI-0284 | Multiples vulnérabilités dans les produits Siemens | 2025-04-08T00:00:00.000000 | 2025-04-08T00:00:00.000000 |
| CERTFR-2025-AVI-0282 | Multiples vulnérabilités dans Schneider Electric ConneXium Network Manager | 2025-04-08T00:00:00.000000 | 2025-04-08T00:00:00.000000 |
| CERTFR-2025-AVI-0281 | Multiples vulnérabilités dans Google Android | 2025-04-08T00:00:00.000000 | 2025-04-08T00:00:00.000000 |
| certfr-2025-avi-0280 | Vulnérabilité dans les produits ESET | 2025-04-07T00:00:00.000000 | 2025-04-07T00:00:00.000000 |
| CERTFR-2025-AVI-0280 | Vulnérabilité dans les produits ESET | 2025-04-07T00:00:00.000000 | 2025-04-07T00:00:00.000000 |
| certfr-2025-avi-0279 | Multiples vulnérabilités dans les produits IBM | 2025-04-04T00:00:00.000000 | 2025-04-04T00:00:00.000000 |
| certfr-2025-avi-0278 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-04-04T00:00:00.000000 | 2025-04-04T00:00:00.000000 |
| certfr-2025-avi-0277 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-04-04T00:00:00.000000 | 2025-04-04T00:00:00.000000 |
| certfr-2025-avi-0276 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-04-04T00:00:00.000000 | 2025-04-04T00:00:00.000000 |
| certfr-2025-avi-0275 | Multiples vulnérabilités dans Microsoft Edge | 2025-04-04T00:00:00.000000 | 2025-04-04T00:00:00.000000 |
| certfr-2025-avi-0274 | Multiples vulnérabilités dans MISP | 2025-04-04T00:00:00.000000 | 2025-04-04T00:00:00.000000 |
| CERTFR-2025-AVI-0279 | Multiples vulnérabilités dans les produits IBM | 2025-04-04T00:00:00.000000 | 2025-04-04T00:00:00.000000 |
| CERTFR-2025-AVI-0278 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-04-04T00:00:00.000000 | 2025-04-04T00:00:00.000000 |
| CERTFR-2025-AVI-0277 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-04-04T00:00:00.000000 | 2025-04-04T00:00:00.000000 |