Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-64678 |
8.8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:56:07.648Z | 2026-01-28T18:16:19.362Z |
| CVE-2025-64672 |
8.8 (3.1)
|
Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft |
Microsoft SharePoint Server Subscription Edition |
2025-12-09T17:56:06.979Z | 2026-01-28T18:16:18.635Z |
| CVE-2025-62553 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft Office 2019 |
2025-12-09T17:55:55.901Z | 2026-01-28T18:16:14.756Z |
| CVE-2025-62455 |
7.8 (3.1)
|
Microsoft Message Queuing (MSMQ) Elevation of Privileg… |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:55:48.052Z | 2026-01-28T18:16:11.002Z |
| CVE-2025-64667 |
5.3 (3.1)
|
Microsoft Exchange Server Spoofing Vulnerability |
Microsoft |
Microsoft Exchange Server Subscription Edition RTM |
2025-12-09T17:55:44.488Z | 2026-01-28T18:16:08.066Z |
| CVE-2025-64666 |
7.5 (3.1)
|
Microsoft Exchange Server Elevation of Privilege Vulne… |
Microsoft |
Microsoft Exchange Server 2019 Cumulative Update 15 |
2025-12-09T17:55:45.263Z | 2026-01-28T18:16:08.672Z |
| CVE-2025-62563 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Office Online Server |
2025-12-09T17:55:40.704Z | 2026-01-28T18:16:06.110Z |
| CVE-2025-62458 |
7.8 (3.1)
|
Win32k Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-12-09T17:55:34.989Z | 2026-01-28T18:16:02.671Z |
| CVE-2025-57796 |
6.8 (3.1)
|
Use of a hardcoded static key to protect sensitive dat… |
Explorance |
Blue |
2026-01-28T17:47:56.607Z | 2026-01-28T18:11:13.946Z |
| CVE-2025-33237 |
5.5 (3.1)
|
NVIDIA HD Audio Driver for Windows contains a vul… |
NVIDIA |
GeForce |
2026-01-28T17:49:02.521Z | 2026-01-28T18:02:25.586Z |
| CVE-2025-23276 |
7.8 (3.1)
|
NVIDIA Installer for Windows contains a vulnerabi… |
NVIDIA |
GPU Display Drivers |
2025-08-02T22:01:47.735Z | 2026-01-28T17:59:24.517Z |
| CVE-2026-24685 |
9.4 (4.0)
|
OpenProject has Argument Injection on Repository modul… |
opf |
openproject |
2026-01-28T16:47:22.850Z | 2026-01-28T17:54:14.053Z |
| CVE-2025-68030 |
7.2 (3.1)
|
WordPress Frontis Blocks plugin <= 1.1.5 - Server Side… |
WP Messiah |
Frontis Blocks |
2026-01-22T16:52:04.821Z | 2026-01-28T17:31:29.744Z |
| CVE-2025-68034 |
9.3 (3.1)
|
WordPress CleverReach® WP plugin <= 1.5.22 - SQL Injec… |
CleverReach® |
CleverReach® WP |
2026-01-22T16:52:05.046Z | 2026-01-28T17:28:24.636Z |
| CVE-2025-68035 |
7.5 (3.1)
|
WordPress Tabby Checkout plugin <= 5.8.4 - Sensitive D… |
tabbyai |
Tabby Checkout |
2026-01-22T16:52:05.252Z | 2026-01-28T17:25:21.581Z |
| CVE-2025-68041 |
7.1 (3.1)
|
WordPress Omnichannel for WooCommerce plugin <= 1.3.65… |
codisto |
Omnichannel for WooCommerce |
2026-01-22T16:52:05.698Z | 2026-01-28T17:24:27.636Z |
| CVE-2025-68046 |
6.5 (3.1)
|
WordPress Contact Form & Lead Form Elementor Builder p… |
ThemeHunk |
Contact Form & Lead Form Elementor Builder |
2026-01-22T16:52:05.895Z | 2026-01-28T17:23:46.876Z |
| CVE-2026-24530 |
5.3 (3.1)
|
WordPress WebP Conversion plugin <= 2.1 - Broken Acces… |
sheepfish |
WebP Conversion |
2026-01-23T14:28:50.001Z | 2026-01-28T17:23:45.267Z |
| CVE-2025-68047 |
8.8 (3.1)
|
WordPress Eventin plugin <= 4.1.1 - PHP Object Injecti… |
Arraytics |
Eventin |
2026-01-22T16:52:06.124Z | 2026-01-28T17:21:42.963Z |
| CVE-2025-68015 |
9 (3.1)
|
WordPress Event Tickets with Ticket Scanner plugin <= … |
Vollstart |
Event Tickets with Ticket Scanner |
2026-01-22T16:52:03.228Z | 2026-01-28T17:20:22.234Z |
| CVE-2025-68016 |
6.5 (3.1)
|
WordPress onepay Payment Gateway For WooCommerce plugi… |
Onepay Sri Lanka |
onepay Payment Gateway For WooCommerce |
2026-01-22T16:52:03.497Z | 2026-01-28T17:18:11.108Z |
| CVE-2025-68017 |
7.5 (3.1)
|
WordPress Antideo Email Validator plugin <= 1.0.10 - S… |
Antideo |
Antideo Email Validator |
2026-01-22T16:52:03.768Z | 2026-01-28T17:14:05.415Z |
| CVE-2025-68018 |
9.4 (3.1)
|
WordPress Order Listener for WooCommerce plugin <= 3.6… |
ilmosys |
Order Listener for WooCommerce |
2026-01-22T16:52:03.969Z | 2026-01-28T17:09:19.390Z |
| CVE-2025-68057 |
7.6 (3.1)
|
WordPress Hospital Doctor Directory plugin <= 1.3.9 - … |
e-plugins |
Hospital Doctor Directory |
2026-01-22T16:52:06.352Z | 2026-01-28T17:02:22.911Z |
| CVE-2026-22458 |
5.3 (3.1)
|
WordPress Wanderland theme <= 1.5 - Broken Access Cont… |
Mikado-Themes |
Wanderland |
2026-01-22T16:52:39.562Z | 2026-01-28T17:01:47.729Z |
| CVE-2025-68058 |
7.6 (3.1)
|
WordPress Institutions Directory plugin <= 1.3..4 - Br… |
e-plugins |
Institutions Directory |
2026-01-22T16:52:06.554Z | 2026-01-28T17:00:49.571Z |
| CVE-2025-68059 |
7.6 (3.1)
|
WordPress Hotel Listing plugin <= 1.4.2 - Broken Acces… |
e-plugins |
Hotel Listing |
2026-01-22T16:52:06.756Z | 2026-01-28T16:54:18.281Z |
| CVE-2025-68912 |
8.6 (3.1)
|
WordPress HDForms plugin <= 1.6.1 - Arbitrary File Del… |
Harmonic Design |
HDForms |
2026-01-22T16:52:15.047Z | 2026-01-28T16:53:38.047Z |
| CVE-2025-69037 |
8.1 (3.1)
|
WordPress Pippo theme <= 1.2.3 - Local File Inclusion … |
goalthemes |
Pippo |
2026-01-22T16:52:17.366Z | 2026-01-28T16:51:46.225Z |
| CVE-2025-68909 |
9.9 (3.1)
|
WordPress Blogistic theme <= 1.0.5 - Arbitrary File Up… |
blazethemes |
Blogistic |
2026-01-22T16:52:14.365Z | 2026-01-28T16:48:12.303Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-22039 |
10 (3.1)
|
Kyverno Cross-Namespace Privilege Escalation via Polic… |
kyverno |
kyverno |
2026-01-27T16:07:19.698Z | 2026-01-27T16:42:49.789Z |
| CVE-2026-21851 |
5.3 (3.1)
|
MONAI has Path Traversal (Zip Slip) in NGC Private Bun… |
Project-MONAI |
MONAI |
2026-01-07T22:27:19.410Z | 2026-01-08T20:09:55.184Z |
| CVE-2025-67717 |
5.3 (4.0)
|
Zitadel Discloses the Total Number of Instance Users |
zitadel |
zitadel |
2025-12-11T00:30:19.192Z | 2025-12-11T18:43:08.454Z |
| CVE-2026-24117 |
5.3 (3.1)
|
Rekor affected by Server-Side Request Forgery (SSRF) v… |
sigstore |
rekor |
2026-01-22T22:05:08.136Z | 2026-01-23T20:14:54.031Z |
| CVE-2026-23831 |
5.3 (3.1)
|
Rekor COSE v0.0.1 Canonicalize crashes when passed emp… |
sigstore |
rekor |
2026-01-22T21:26:22.183Z | 2026-01-23T14:32:43.078Z |
| CVE-2022-2552 |
N/A
|
Duplicator < 1.4.7.1 - Unauthenticated System Informat… |
Unknown |
Duplicator |
2022-08-22T15:04:02 | 2024-08-03T00:39:08.064Z |
| CVE-2022-2551 |
N/A
|
Duplicator < 1.4.7 - Unauthenticated Backup Download |
Unknown |
Duplicator – WordPress Migration Plugin |
2022-08-22T15:03:52 | 2024-08-03T00:39:08.049Z |
| CVE-2020-11738 |
7.5 (3.0)
|
The Snap Creek Duplicator plugin before 1.3.28 fo… |
n/a |
n/a |
2020-04-13T21:20:00.000Z | 2026-01-12T20:20:55.122Z |
| CVE-2018-7543 |
N/A
|
Cross-site scripting (XSS) vulnerability in insta… |
n/a |
n/a |
2018-03-26T18:00:00 | 2024-08-05T06:31:04.470Z |
| CVE-2018-25095 |
9.8 (3.1)
|
Duplicator < 1.3.0 - Unauthenticated RCE |
Unknown |
Duplicator |
2024-01-08T19:00:33.155Z | 2025-06-03T14:34:46.451Z |
| CVE-2018-17207 |
N/A
|
An issue was discovered in Snap Creek Duplicator … |
n/a |
n/a |
2018-09-19T16:00:00Z | 2024-09-17T03:59:04.103Z |
| CVE-2025-67713 |
5.3 (4.0)
|
Miniflux 2 has an Open Redirect via protocol-relative … |
miniflux |
v2 |
2025-12-11T00:17:00.282Z | 2025-12-11T18:52:30.866Z |
| CVE-2026-21852 |
5.3 (4.0)
|
Claude Code Leaks Data via Malicious Environment Confi… |
anthropics |
claude-code |
2026-01-21T20:42:06.812Z | 2026-01-21T21:34:43.858Z |
| CVE-2025-59935 |
6.5 (3.1)
|
GLPI Vulnerable to Unauthenticated Stored XSS on the I… |
glpi-project |
glpi |
2025-12-16T16:34:46.251Z | 2025-12-16T17:15:24.435Z |
| CVE-2025-7397 |
6.8 (4.0)
|
CLI history displays inline passwords |
Broadcom |
Brocade ASCG |
2025-07-17T21:53:39.786Z | 2025-07-18T14:10:37.202Z |
| CVE-2025-7398 |
8.6 (4.0)
|
Medium Strength Cipher Suites detected on port on port… |
Broadcom |
Brocade ASCG |
2025-07-17T21:28:57.410Z | 2025-07-18T14:57:57.810Z |
| CVE-2025-66039 |
9.3 (4.0)
|
FreePBX Endpoint Manager Allows Unauthenticated Logins… |
FreePBX |
security-reporting |
2025-12-09T21:32:03.412Z | 2025-12-17T04:55:44.692Z |
| CVE-2025-62408 |
5.9 (3.1)
|
c-ares has a Use After Free vulnerability when connect… |
c-ares |
c-ares |
2025-12-08T22:04:08.565Z | 2025-12-09T16:05:06.098Z |
| CVE-2026-23892 |
6 (4.0)
|
OctoPrint has Timing Side-Channel Vulnerability in API… |
OctoPrint |
OctoPrint |
2026-01-27T18:35:31.370Z | 2026-01-27T19:14:50.643Z |
| CVE-2026-24842 |
8.2 (3.1)
|
node-tar Vulnerable to Arbitrary File Creation/Overwri… |
isaacs |
node-tar |
2026-01-28T00:20:13.261Z | 2026-01-28T14:56:10.317Z |
| CVE-2026-24739 |
6.3 (3.1)
|
Symfony has incorrect argument escaping under MSYS2/Gi… |
symfony |
symfony |
2026-01-28T20:25:21.500Z | 2026-01-29T18:01:36.510Z |
| CVE-2026-23968 |
6.8 (4.0)
|
Copier safe template has arbitrary filesystem read acc… |
copier-org |
copier |
2026-01-21T22:13:25.377Z | 2026-01-22T16:49:32.054Z |
| CVE-2026-23986 |
6.9 (4.0)
|
Copier safe template has arbitrary filesystem write ac… |
copier-org |
copier |
2026-01-21T22:20:37.720Z | 2026-01-22T16:49:26.426Z |
| CVE-2025-69285 |
7.7 (4.0)
|
SQLBot uploadExcel Endpoint has Unauthenticated Arbitr… |
dataease |
SQLBot |
2026-01-21T20:05:22.108Z | 2026-01-21T21:27:55.889Z |
| CVE-2026-24127 |
5.4 (3.1)
|
Typemill has Reflected XSS via login error view template |
typemill |
typemill |
2026-01-23T23:01:15.832Z | 2026-01-26T16:18:10.770Z |
| CVE-2026-21520 |
7.5 (3.1)
|
Copilot Studio Information Disclosure Vulnerability |
Microsoft |
Microsoft Copilot Studio |
2026-01-22T22:47:33.536Z | 2026-01-30T03:40:01.713Z |
| CVE-2026-21521 |
7.4 (3.1)
|
Word Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Word Copilot |
2026-01-22T22:47:38.118Z | 2026-01-30T03:40:06.091Z |
| CVE-2026-23848 |
6.5 (3.1)
|
MyTube has Rate Limiting Bypass via X-Forwarded-For He… |
franklioxygen |
MyTube |
2026-01-19T20:34:40.060Z | 2026-01-20T20:04:56.547Z |
| CVE-2026-24139 |
8.7 (4.0)
|
MyTube Allows Unauthorized Database Export by Guest Users |
franklioxygen |
MyTube |
2026-01-23T23:55:23.541Z | 2026-01-26T16:18:05.863Z |
| CVE-2026-24140 |
2.7 (3.1)
|
MyTube has Mass Assignment via Settings Management |
franklioxygen |
MyTube |
2026-01-23T23:59:56.045Z | 2026-01-26T16:17:58.728Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23831 | Rekor is a software supply chain transparency log. In versions 1.4.3 and below, the entry implement… | 2026-01-22T22:16:19.523 | 2026-02-02T15:06:43.427 |
| fkie_cve-2022-2552 | The Duplicator WordPress plugin before 1.4.7 does not authenticate or authorize visitors before dis… | 2022-08-22T15:15:15.373 | 2026-02-02T15:06:20.273 |
| fkie_cve-2022-2551 | The Duplicator WordPress plugin before 1.4.7 discloses the url of the a backup to unauthenticated v… | 2022-08-22T15:15:15.317 | 2026-02-02T15:06:20.273 |
| fkie_cve-2020-11738 | The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) al… | 2020-04-13T22:15:10.660 | 2026-02-02T15:06:20.273 |
| fkie_cve-2018-7543 | Cross-site scripting (XSS) vulnerability in installer/build/view.step4.php of the SnapCreek Duplica… | 2018-03-26T18:29:01.440 | 2026-02-02T15:06:20.273 |
| fkie_cve-2018-25095 | The Duplicator WordPress plugin before 1.3.0 does not properly escape values when its installer scr… | 2024-01-08T19:15:08.377 | 2026-02-02T15:06:20.273 |
| fkie_cve-2018-17207 | An issue was discovered in Snap Creek Duplicator before 1.2.42. By accessing leftover installer fil… | 2018-09-19T16:29:01.223 | 2026-02-02T15:06:20.273 |
| fkie_cve-2025-67713 | Miniflux 2 is an open source feed reader. Versions 2.2.14 and below treat redirect_url as safe when… | 2025-12-11T01:16:00.277 | 2026-02-02T15:05:56.917 |
| fkie_cve-2026-21852 | Claude Code is an agentic coding tool. Prior to version 2.0.65, vulnerability in Claude Code's proj… | 2026-01-21T21:16:08.693 | 2026-02-02T15:04:41.717 |
| fkie_cve-2025-59935 | GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to ve… | 2025-12-16T17:16:10.137 | 2026-02-02T14:59:28.943 |
| fkie_cve-2025-7397 | A vulnerability in the ascgshell, of Brocade ASCG before 3.3.0 stores any command executed in the … | 2025-07-17T22:15:27.270 | 2026-02-02T14:55:13.333 |
| fkie_cve-2025-7398 | Brocade ASCG before 3.3.0 allows for the use of medium strength cryptography algorithms on internal… | 2025-07-17T22:15:27.413 | 2026-02-02T14:54:24.873 |
| fkie_cve-2025-66039 | FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions … | 2025-12-09T22:16:15.757 | 2026-02-02T14:47:12.183 |
| fkie_cve-2025-62408 | c-ares is an asynchronous resolver library. Versions 1.32.3 through 1.34.5 terminate a query after… | 2025-12-08T22:15:52.620 | 2026-02-02T14:40:44.843 |
| fkie_cve-2026-23892 | OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up to a… | 2026-01-27T19:16:16.027 | 2026-02-02T14:39:36.583 |
| fkie_cve-2026-24842 | node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security … | 2026-01-28T01:16:14.947 | 2026-02-02T14:30:10.890 |
| fkie_cve-2026-24739 | Symfony is a PHP framework for web and console applications and a set of reusable PHP components. P… | 2026-01-28T21:16:11.750 | 2026-02-02T14:24:27.267 |
| fkie_cve-2026-23968 | Copier is a library and CLI app for rendering project templates. Prior to version 9.11.2, Copier su… | 2026-01-21T23:15:52.637 | 2026-02-02T14:11:03.307 |
| fkie_cve-2026-23986 | Copier is a library and CLI app for rendering project templates. Prior to version 9.11.2, Copier su… | 2026-01-21T23:15:52.793 | 2026-02-02T14:10:51.063 |
| fkie_cve-2025-69285 | SQLBot is an intelligent data query system based on a large language model and RAG. Versions prior … | 2026-01-21T21:16:07.380 | 2026-02-02T13:57:50.020 |
| fkie_cve-2026-24127 | Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A re… | 2026-01-23T23:15:54.360 | 2026-02-02T13:32:53.560 |
| fkie_cve-2026-21520 | Exposure of Sensitive Information to an Unauthorized Actor in Copilot Studio allows a unauthenticat… | 2026-01-22T23:15:57.657 | 2026-02-02T13:31:19.580 |
| fkie_cve-2026-21521 | Improper neutralization of escape, meta, or control sequences in Copilot allows an unauthorized att… | 2026-01-22T23:15:57.823 | 2026-02-02T13:30:53.350 |
| fkie_cve-2026-23848 | MyTube is a self-hosted downloader and player for several video websites. Prior to version 1.7.71, … | 2026-01-19T21:15:51.433 | 2026-02-02T13:27:34.320 |
| fkie_cve-2026-24139 | MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below… | 2026-01-24T00:15:49.313 | 2026-02-02T13:26:40.357 |
| fkie_cve-2026-24140 | MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below… | 2026-01-24T00:15:49.450 | 2026-02-02T13:26:17.833 |
| fkie_cve-2026-23837 | MyTube is a self-hosted downloader and player for several video websites. A vulnerability present i… | 2026-01-19T21:15:50.903 | 2026-02-02T13:24:34.437 |
| fkie_cve-2026-21569 | This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.… | 2026-01-28T01:16:14.187 | 2026-02-02T13:22:24.383 |
| fkie_cve-2024-2420 | LenelS2 NetBox access control and event monitoring system was discovered to contain Hardcoded Crede… | 2024-05-30T18:15:09.070 | 2026-02-02T13:14:26.023 |
| fkie_cve-2024-2422 | LenelS2 NetBox access control and event monitoring system was discovered to contain an authenticate… | 2024-05-30T18:15:09.367 | 2026-02-02T13:13:52.333 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-24v5-4jhh-vxrv |
6.4 (3.1)
|
The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Stored Cros… | 2026-01-28T15:31:30Z | 2026-01-28T15:31:30Z |
| ghsa-wwvm-vmw2-56q8 |
3.7 (3.1)
7.0 (4.0)
|
When a user configures the NAS to retrieve UPS status or control the UPS, a non-enforced TLS certif… | 2025-12-12T03:30:20Z | 2026-01-28T15:31:29Z |
| ghsa-qf35-p6j5-89hp |
7.8 (3.1)
8.5 (4.0)
|
An uncontrolled DLL loading path vulnerability exists in AsusSoftwareManagerAgent. A local attacker… | 2026-01-06T03:31:36Z | 2026-01-28T15:31:29Z |
| ghsa-9cx6-52c2-phg6 |
5.9 (3.1)
7.0 (4.0)
|
When the user set the Notification's sender to send emails to the SMTP server via msmtp, an imprope… | 2025-12-12T03:30:19Z | 2026-01-28T15:31:28Z |
| ghsa-xgm3-v5hc-wc6j |
8.2 (4.0)
|
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a remote denial-o… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:29Z |
| ghsa-x94j-wr94-g6g7 |
4.3 (3.1)
|
The imwptip plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to,… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-q3p7-5h3x-778g |
5.1 (4.0)
|
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent auth… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-q3j5-7jc9-jvf7 |
5.3 (3.1)
|
The Vzaar Media Management plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in … | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-ppq6-cj3p-4xhv |
8.8 (3.1)
|
The Simple User Registration plugin for WordPress is vulnerable to privilege escalation in versions… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-p7w4-x87r-m2xc |
4.3 (3.1)
|
The Bitcoin Donate Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all v… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-m9wm-cxxw-876h |
8.5 (4.0)
|
Disk Pulse Enterprise v10.4.18 has an authenticated reflected XSS vulnerability in the '/monitor_di… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-gmxm-wmfm-4gvg |
4.4 (3.1)
|
The WP Google Ad Manager Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting v… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-g2xg-qw63-fpx3 |
6.9 (4.0)
|
Stored Cross-Site Scripting (XSS) vulnerability in the PDF file upload functionality of Live Helper… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-fcg3-c6jm-9qxr |
5.1 (4.0)
|
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent auth… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-cg8j-jfqg-q55w |
5.1 (4.0)
|
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent auth… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-95g8-rf6q-22v9 |
7.5 (3.1)
|
The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a … | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-4qh4-93x2-h5wr |
4.3 (3.1)
|
The Change WP URL plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions … | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-45v9-p764-4x3m |
5.1 (4.0)
|
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent auth… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-v47p-p4r6-wcwj |
5.3 (3.1)
|
The Rupantorpay plugin for WordPress is vulnerable to unauthorized modification of data due to a mi… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-rc9r-w4h6-4hqv |
6.4 (3.1)
|
The BlockArt Blocks – Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Tem… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-pgp3-jrf2-crj2 |
6.0 (4.0)
|
Vulnerability that allows a Padding Oracle Attack to be performed on the Funambol v30.0.0.20 cloud … | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-mf42-3pgf-r88c |
8.8 (3.1)
|
The Search Atlas SEO – Premier SEO Plugin for One-Click WP Publishing & Integrated AI Optimization … | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-jfcj-mjhj-m88q |
5.1 (4.0)
|
Sync Breeze Enterprise Server v10.4.18 and Disk Pulse Enterprise v10.4.18 contain a persistent auth… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-g75h-mgx2-c5rq |
8.5 (4.0)
|
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk … | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-cqpf-3v3x-x2f7 |
6.1 (3.1)
|
The SEO Links Interlinking plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-chvq-5q36-924f |
7.1 (4.0)
|
Johnson Controls iSTAR Configuration Utility (ICU) has Stack-based Buffer Overflow vulnerability. T… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-7c75-f958-6j3m |
4.3 (3.1)
|
The Recooty – Job Widget (Old Dashboard) plugin for WordPress is vulnerable to Cross-Site Request F… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-75rp-pqq4-fpv7 |
8.5 (4.0)
|
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk … | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-33r4-r5rc-phcf |
8.5 (4.0)
|
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk … | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-3376-jw3x-f6j6 |
8.5 (4.0)
|
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk … | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-179 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.937409Z |
| pysec-2021-178 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.768951Z |
| pysec-2021-177 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.584780Z |
| pysec-2021-176 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.395200Z |
| pysec-2021-175 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.180235Z |
| pysec-2021-174 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.012732Z |
| pysec-2021-173 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:27.845923Z |
| pysec-2021-172 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:27.629630Z |
| pysec-2021-171 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:27.421981Z |
| pysec-2021-170 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:27.240459Z |
| pysec-2021-169 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can fo… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:27.051975Z |
| pysec-2021-168 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:26.851089Z |
| pysec-2021-167 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:26.683297Z |
| pysec-2021-166 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:26.519373Z |
| pysec-2021-165 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:26.348588Z |
| pysec-2021-164 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:26.181060Z |
| pysec-2021-163 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.990763Z |
| pysec-2021-162 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.775857Z |
| pysec-2021-161 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.604287Z |
| pysec-2021-160 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.367237Z |
| pysec-2021-159 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `tf.raw_ops.Co… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.206676Z |
| pysec-2021-158 |
|
TensorFlow is an end-to-end open source platform for machine learning. Specifying a negat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:25.027733Z |
| pysec-2021-157 |
|
TensorFlow is an end-to-end open source platform for machine learning. Missing validation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.934633Z |
| pysec-2021-156 |
|
TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.765492Z |
| pysec-2021-155 |
|
TensorFlow is an end-to-end open source platform for machine learning. In eager mode (def… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.585448Z |
| pysec-2021-154 |
|
TensorFlow is an end-to-end open source platform for machine learning. A malicious user c… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.411852Z |
| pysec-2021-153 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.214869Z |
| pysec-2021-152 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:24.038004Z |
| pysec-2021-151 |
|
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` ar… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:23.861341Z |
| pysec-2021-150 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling TF operati… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:23.682962Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32284 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.029082Z |
| gsd-2024-32283 | Tenda FH1203 V2.0.1.6 firmware has a command injection vulnerablility in formexeCommand f… | 2024-04-13T05:02:29.045805Z |
| gsd-2024-32282 | Tenda FH1202 v1.2.0.14(408) firmware contains a command injection vulnerablility in the f… | 2024-04-13T05:02:29.078830Z |
| gsd-2024-32281 | Tenda AC7V1.0 v15.03.06.44 firmware contains a command injection vulnerablility in formex… | 2024-04-13T05:02:29.051225Z |
| gsd-2024-32280 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.133247Z |
| gsd-2024-32279 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.079893Z |
| gsd-2024-32278 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.036847Z |
| gsd-2024-32277 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.123802Z |
| gsd-2024-32276 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.078227Z |
| gsd-2024-32275 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.033362Z |
| gsd-2024-32274 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.076373Z |
| gsd-2024-32273 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.048759Z |
| gsd-2024-32272 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.031169Z |
| gsd-2024-32271 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.090648Z |
| gsd-2024-32270 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.106273Z |
| gsd-2024-32269 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.062152Z |
| gsd-2024-32268 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.062352Z |
| gsd-2024-32267 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.027097Z |
| gsd-2024-32266 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.137388Z |
| gsd-2024-32265 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.064928Z |
| gsd-2024-32264 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.147153Z |
| gsd-2024-32263 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.037043Z |
| gsd-2024-32262 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.139229Z |
| gsd-2024-32261 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.092785Z |
| gsd-2024-32260 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.085284Z |
| gsd-2024-32259 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.083669Z |
| gsd-2024-32258 | The network server of fceux 2.7.0 has a path traversal vulnerability, allowing attackers … | 2024-04-13T05:02:29.145748Z |
| gsd-2024-32257 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.115592Z |
| gsd-2024-32256 | Phpgurukul Tourism Management System v2.0 is vulnerable to Unrestricted Upload of File wi… | 2024-04-13T05:02:29.101041Z |
| gsd-2024-32255 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.083472Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-192564 | Malicious code in sdbao-content-report (npm) | 2025-12-12T06:34:05Z | 2025-12-24T10:09:30Z |
| MAL-2025-192563 | Malicious code in sd-pay-ts (npm) | 2025-12-12T06:34:06Z | 2025-12-24T10:09:30Z |
| MAL-2025-192562 | Malicious code in sd-pay (npm) | 2025-12-12T06:34:06Z | 2025-12-24T10:09:30Z |
| MAL-2025-192417 | Malicious code in rum-events-format (npm) | 2025-12-10T01:57:45Z | 2025-12-24T10:09:30Z |
| MAL-2025-192401 | Malicious code in serval-integrations-common-frontend (npm) | 2025-12-10T01:43:51Z | 2025-12-24T10:09:30Z |
| MAL-2025-192315 | Malicious code in seeds-random (npm) | 2025-12-05T03:03:24Z | 2025-12-24T10:09:30Z |
| MAL-2025-191595 | Malicious code in tailwindcss-forms (npm) | 2025-12-01T13:26:48Z | 2025-12-24T10:09:30Z |
| MAL-2025-191594 | Malicious code in tailwind-style-override (npm) | 2025-12-01T13:26:47Z | 2025-12-24T10:09:30Z |
| MAL-2025-191593 | Malicious code in tailwind-state (npm) | 2025-12-01T13:26:43Z | 2025-12-24T10:09:30Z |
| MAL-2025-191588 | Malicious code in stringify-coder (npm) | 2025-12-01T13:26:20Z | 2025-12-24T10:09:30Z |
| MAL-2025-191586 | Malicious code in session-validate (npm) | 2025-12-01T13:25:08Z | 2025-12-24T10:09:30Z |
| MAL-2025-191582 | Malicious code in react-mandes (npm) | 2025-12-01T13:22:29Z | 2025-12-24T10:09:30Z |
| MAL-2025-191581 | Malicious code in react-adparser (npm) | 2025-12-01T13:22:08Z | 2025-12-24T10:09:30Z |
| MAL-2025-191503 | Malicious code in start-internal (npm) | 2025-12-01T16:00:47Z | 2025-12-24T10:09:30Z |
| MAL-2025-191428 | Malicious code in solomon-v3-stories (npm) | 2025-11-24T23:41:58Z | 2025-12-24T10:09:30Z |
| MAL-2025-191423 | Malicious code in shelf-jwt-sessions (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:30Z |
| MAL-2025-191422 | Malicious code in selenium-session-client (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:30Z |
| MAL-2025-191421 | Malicious code in selenium-session (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:30Z |
| MAL-2025-191403 | Malicious code in prompt-eng-server (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:30Z |
| mal-2025-855 | Malicious code in mongodb-chatbot-verified-answers (npm) | 2025-02-03T16:56:51Z | 2025-12-24T10:09:29Z |
| mal-2025-49428 | Malicious code in otetotvot (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:29Z |
| mal-2025-49427 | Malicious code in otetoparserlparser (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:29Z |
| mal-2025-49263 | Malicious code in pixelblm (npm) | 2025-10-30T23:58:26Z | 2025-12-24T10:09:29Z |
| mal-2025-47947 | Malicious code in orvlla (npm) | 2025-10-07T02:39:41Z | 2025-12-24T10:09:29Z |
| mal-2025-47929 | Malicious code in mcp-server-fixthis (npm) | 2025-10-07T00:24:42Z | 2025-12-24T10:09:29Z |
| mal-2025-47857 | Malicious code in pc-analytics-promotion-creation-core (npm) | 2025-09-26T04:46:33Z | 2025-12-24T10:09:29Z |
| mal-2025-47593 | Malicious code in package-x (npm) | 2025-09-23T18:30:20Z | 2025-12-24T10:09:29Z |
| mal-2025-3412 | Malicious code in pdf-to-office (npm) | 2025-04-23T15:57:31Z | 2025-12-24T10:09:29Z |
| mal-2025-192400 | Malicious code in node-calculator-0d96 (npm) | 2025-12-10T01:43:14Z | 2025-12-24T10:09:29Z |
| mal-2025-191580 | Malicious code in pixel-bloom (npm) | 2025-12-01T13:20:52Z | 2025-12-24T10:09:29Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-2059 | Red Hat Enterprise Linux (flatpak): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-09-04T22:00:00.000+00:00 | 2025-03-31T22:00:00.000+00:00 |
| wid-sec-w-2024-0778 | X.Org X Server und Xming: Mehrere Schwachstellen | 2024-04-03T22:00:00.000+00:00 | 2025-03-31T22:00:00.000+00:00 |
| wid-sec-w-2024-0127 | X.Org X11: Mehrere Schwachstellen | 2024-01-16T23:00:00.000+00:00 | 2025-03-31T22:00:00.000+00:00 |
| wid-sec-w-2023-3131 | X.Org X11: Mehrere Schwachstellen | 2023-12-12T23:00:00.000+00:00 | 2025-03-31T22:00:00.000+00:00 |
| wid-sec-w-2023-2749 | X.Org X11: Mehrere Schwachstellen | 2023-10-25T22:00:00.000+00:00 | 2025-03-31T22:00:00.000+00:00 |
| wid-sec-w-2023-0793 | X.Org X11: Schwachstelle ermöglicht Privilegieneskalation oder Codeausführung | 2023-03-29T22:00:00.000+00:00 | 2025-03-31T22:00:00.000+00:00 |
| wid-sec-w-2023-0293 | X.Org X11: Schwachstelle ermöglicht Privilegieneskalation | 2023-02-06T23:00:00.000+00:00 | 2025-03-31T22:00:00.000+00:00 |
| wid-sec-w-2022-2312 | X.Org X11: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2022-12-13T23:00:00.000+00:00 | 2025-03-31T22:00:00.000+00:00 |
| wid-sec-w-2022-0148 | vim: Schwachstelle ermöglicht Denial of Service | 2022-02-03T23:00:00.000+00:00 | 2025-03-31T22:00:00.000+00:00 |
| wid-sec-w-2025-0658 | libarchive: Schwachstelle ermöglicht Denial of Service | 2025-03-30T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-0656 | MISP: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2025-03-30T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-0655 | IBM InfoSphere Information Server: Mehrere Schwachstellen | 2025-03-30T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-0654 | PyTorch: Schwachstelle ermöglicht Denial of Service | 2025-03-30T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-0653 | Kubernetes: Schwachstelle ermöglicht Denial of Service | 2019-10-03T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-0413 | Exim: Schwachstelle ermöglicht SQL-Injection | 2025-02-19T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-0001 | IBM DB2: Mehrere Schwachstellen | 2025-01-01T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-3594 | Ansible: Schwachstelle ermöglicht Offenlegung von Informationen | 2019-10-08T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-3590 | Ansible: Schwachstelle ermöglicht Offenlegung von Informationen | 2020-03-12T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-3588 | Ansible: Schwachstelle ermöglicht Offenlegung von Informationen | 2021-06-07T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-3515 | Kubernetes (kubelet): Schwachstelle ermöglicht Codeausführung | 2024-11-20T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-3457 | IBM DB2: Mehrere Schwachstellen | 2024-11-13T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-1853 | VMware Tanzu Spring Framework: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-08-14T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-1031 | Bouncy Castle: Mehrere Schwachstellen | 2024-05-05T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-0682 | Ruby: Mehrere Schwachstellen | 2024-03-20T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2024-0291 | vim: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-02-04T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-3227 | Ansible: Schwachstelle ermöglicht Offenlegung von Informationen | 2019-07-24T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2542 | vim: Schwachstelle ermöglicht Denial of Service | 2023-10-03T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2482 | Ansible: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode | 2019-12-08T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2359 | Eclipse Jetty: Mehrere Schwachstellen | 2023-09-14T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2269 | vim: Schwachstelle ermöglicht Codeausführung, Dos oder Speicheränderung | 2023-09-05T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:3323 | Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update | 2023-05-25T12:29:39+00:00 | 2026-02-03T21:15:08+00:00 |
| rhsa-2023:3319 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2023-05-25T08:10:11+00:00 | 2026-02-03T21:15:07+00:00 |
| rhsa-2023:3318 | Red Hat Security Advisory: go-toolset and golang security update | 2023-05-25T07:58:07+00:00 | 2026-02-03T21:15:06+00:00 |
| rhsa-2023:3204 | Red Hat Security Advisory: OpenShift Virtualization 4.13.0 RPMs security and bug fix update | 2023-05-18T00:39:12+00:00 | 2026-02-03T21:15:06+00:00 |
| rhsa-2023:3205 | Red Hat Security Advisory: OpenShift Virtualization 4.13.0 Images security, bug fix, and enhancement update | 2023-05-18T02:55:08+00:00 | 2026-02-03T21:15:02+00:00 |
| rhsa-2023:3167 | Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images | 2023-05-18T12:12:25+00:00 | 2026-02-03T21:15:00+00:00 |
| rhsa-2023:3083 | Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update | 2023-05-16T10:08:17+00:00 | 2026-02-03T21:15:00+00:00 |
| rhsa-2023:2866 | Red Hat Security Advisory: git-lfs security and bug fix update | 2023-05-16T08:31:11+00:00 | 2026-02-03T21:14:58+00:00 |
| rhsa-2023:2802 | Red Hat Security Advisory: container-tools:4.0 security and bug fix update | 2023-05-16T08:59:44+00:00 | 2026-02-03T21:14:57+00:00 |
| rhsa-2023:2780 | Red Hat Security Advisory: Image Builder security, bug fix, and enhancement update | 2023-05-16T08:57:22+00:00 | 2026-02-03T21:14:57+00:00 |
| rhsa-2023:2758 | Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update | 2023-05-16T08:49:00+00:00 | 2026-02-03T21:14:56+00:00 |
| rhsa-2023:2728 | Red Hat Security Advisory: Red Hat OpenShift Distributed Tracing 2.8.0 security update | 2023-05-10T18:57:18+00:00 | 2026-02-03T21:14:56+00:00 |
| rhsa-2023:2253 | Red Hat Security Advisory: buildah security and bug fix update | 2023-05-09T09:52:10+00:00 | 2026-02-03T21:14:55+00:00 |
| rhsa-2023:2367 | Red Hat Security Advisory: containernetworking-plugins security and bug fix update | 2023-05-09T09:50:34+00:00 | 2026-02-03T21:14:54+00:00 |
| rhsa-2023:2357 | Red Hat Security Advisory: git-lfs security and bug fix update | 2023-05-09T10:03:05+00:00 | 2026-02-03T21:14:53+00:00 |
| rhsa-2023:2283 | Red Hat Security Advisory: skopeo security and bug fix update | 2023-05-09T10:01:47+00:00 | 2026-02-03T21:14:52+00:00 |
| rhsa-2023:2282 | Red Hat Security Advisory: podman security and bug fix update | 2023-05-09T10:01:45+00:00 | 2026-02-03T21:14:52+00:00 |
| rhsa-2023:2236 | Red Hat Security Advisory: toolbox security and bug fix update | 2023-05-09T10:03:47+00:00 | 2026-02-03T21:14:51+00:00 |
| rhsa-2023:2222 | Red Hat Security Advisory: conmon security and bug fix update | 2023-05-09T10:10:29+00:00 | 2026-02-03T21:14:50+00:00 |
| rhsa-2023:2204 | Red Hat Security Advisory: Image Builder security, bug fix, and enhancement update | 2023-05-09T10:11:21+00:00 | 2026-02-03T21:14:49+00:00 |
| rhsa-2023:2193 | Red Hat Security Advisory: butane security, bug fix, and enhancement update | 2023-05-09T09:51:30+00:00 | 2026-02-03T21:14:49+00:00 |
| rhsa-2023:2110 | Red Hat Security Advisory: OpenShift Container Platform 4.12.16 security update | 2023-05-10T14:44:06+00:00 | 2026-02-03T21:14:47+00:00 |
| rhsa-2023:2107 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.9 security and bug fix update | 2023-05-04T01:50:06+00:00 | 2026-02-03T21:14:47+00:00 |
| rhsa-2023:2014 | Red Hat Security Advisory: OpenShift Container Platform 4.11.39 bug fix and security update | 2023-05-02T01:53:03+00:00 | 2026-02-03T21:14:46+00:00 |
| rhsa-2023:1817 | Red Hat Security Advisory: Network observability 1.2.0 for Openshift | 2023-04-18T01:01:18+00:00 | 2026-02-03T21:14:46+00:00 |
| rhsa-2023:1816 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.2 Bug Fix and security update | 2023-04-17T22:34:01+00:00 | 2026-02-03T21:14:45+00:00 |
| rhsa-2023:1591 | Red Hat Security Advisory: pcs security update | 2023-04-04T09:42:21+00:00 | 2026-02-03T21:14:44+00:00 |
| rhsa-2023:1529 | Red Hat Security Advisory: Service Telemetry Framework 1.5 security update | 2023-03-30T00:42:39+00:00 | 2026-02-03T21:14:42+00:00 |
| rhsa-2023:1448 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.3.2 security update | 2023-03-23T17:47:08+00:00 | 2026-02-03T21:14:40+00:00 |
| rhsa-2023:1393 | Red Hat Security Advisory: OpenShift Container Platform 4.10.55 security update | 2023-03-29T00:58:41+00:00 | 2026-02-03T21:14:38+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-326-01 | AVEVA Edge | 2022-11-22T00:00:00.000000Z | 2022-11-22T00:00:00.000000Z |
| icsa-22-321-02 | Cradlepoint IBR600 | 2022-11-17T00:00:00.000000Z | 2022-11-17T00:00:00.000000Z |
| icsa-22-321-01 | Red Lion Crimson | 2022-11-17T00:00:00.000000Z | 2022-11-17T00:00:00.000000Z |
| icsa-22-319-01 | Mitsubishi Electric GT SoftGOT2000 | 2022-11-15T00:00:00.000000Z | 2022-11-15T00:00:00.000000Z |
| icsa-22-228-02 | LS ELECTRIC PLC and XG5000 (Update A) | 2022-08-16T06:00:00.000000Z | 2022-11-14T07:00:00.000000Z |
| icsa-22-314-08 | Omron NJ/NX-series Machine Automation Controllers | 2022-11-10T00:00:00.000000Z | 2022-11-10T00:00:00.000000Z |
| icsa-22-314-07 | Omron NJ/NX-series Machine Automation Controllers | 2022-11-10T00:00:00.000000Z | 2022-11-10T00:00:00.000000Z |
| icsa-22-314-03 | Siemens SINEC Network Management System Logback Component | 2022-11-08T00:00:00.000000Z | 2022-11-08T00:00:00.000000Z |
| icsa-22-314-01 | Siemens Parasolid | 2022-11-08T00:00:00.000000Z | 2022-11-08T00:00:00.000000Z |
| icsa-22-286-15 | Siemens SCALANCE X-200 and X-200IRT Families (Update A) | 2022-10-11T00:00:00.000000Z | 2022-11-08T00:00:00.000000Z |
| icsa-22-307-02 | Nokia ASIK AirScale System Module | 2022-11-03T06:00:00.000000Z | 2022-11-03T06:00:00.000000Z |
| icsa-22-307-03 | Delta Industrial Automation DIALink | 2022-11-03T00:00:00.000000Z | 2022-11-03T00:00:00.000000Z |
| icsa-22-300-03 | Rockwell Automation Stratix Devices Containing Cisco IOS | 2022-10-27T06:00:00.000000Z | 2022-10-27T06:00:00.000000Z |
| icsa-22-300-04 | Trihedral VTScada | 2022-10-27T00:00:00.000000Z | 2022-10-27T00:00:00.000000Z |
| icsa-22-300-02 | SAUTER Controls moduWeb | 2022-10-27T00:00:00.000000Z | 2022-10-27T00:00:00.000000Z |
| icsa-22-300-01 | Rockwell Automation FactoryTalk Alarm and Events Server | 2022-10-27T00:00:00.000000Z | 2022-10-27T00:00:00.000000Z |
| icsma-22-298-01 | AliveCor KardiaMobile | 2022-10-25T06:00:00.000000Z | 2022-10-25T06:00:00.000000Z |
| icsa-22-298-05 | Johnson Controls CKS CEVAS | 2022-10-25T00:00:00.000000Z | 2022-10-25T00:00:00.000000Z |
| icsa-22-298-04 | Hitachi Energy MicroSCADA X DMS600 | 2022-10-25T00:00:00.000000Z | 2022-10-25T00:00:00.000000Z |
| icsa-22-298-01 | Haas Controller | 2022-10-25T00:00:00.000000Z | 2022-10-25T00:00:00.000000Z |
| icsa-22-298-03 | Siemens Siveillance Video Mobile Server | 2022-10-21T00:00:00.000000Z | 2022-10-21T00:00:00.000000Z |
| icsa-22-293-01 | Bentley Systems MicroStation Connect | 2022-10-20T00:00:00.000000Z | 2022-10-20T00:00:00.000000Z |
| icsa-22-291-01 | Advantech R-SeeNet | 2022-10-18T00:00:00.000000Z | 2022-10-18T00:00:00.000000Z |
| icsa-22-286-05 | Hitachi Energy Lumada Asset Performance Management Prognostic Model Executor Service | 2022-10-13T00:00:00.000000Z | 2022-10-13T00:00:00.000000Z |
| icsa-22-286-02 | Siemens Industrial Edge Management | 2022-10-13T00:00:00.000000Z | 2022-10-13T00:00:00.000000Z |
| icsa-22-286-16 | Siemens Desigo CC and Cerberus DMS | 2022-10-11T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-22-286-14 | Siemens SIMATIC HMI Panels | 2022-10-11T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-22-286-10 | Siemens JT Open Toolkit and Simcenter Femap | 2022-10-11T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-22-286-06 | Siemens Desigo PXM Devices | 2022-10-11T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-22-286-04 | Siemens SIMATIC S7-1200 and S7-1500 CPU Families | 2022-10-11T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-fmc-infodisc-rjdktm6f | Cisco Firepower Management Center Information Disclosure Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-fmc-infodisc-RJdktM6f | Cisco Firepower Management Center Information Disclosure Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-hfv73cs3 | Cisco DNA Center Cross-Site Scripting Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-dnac-xss-HfV73cS3 | Cisco DNA Center Cross-Site Scripting Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cucm-logging-6qswkryz | Cisco Unified Communications Products Information Disclosure Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cucm-logging-6QSWKRYz | Cisco Unified Communications Products Information Disclosure Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cmxpe-75asy9k | Cisco Connected Mobile Experiences Privilege Escalation Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cmxpe-75Asy9k | Cisco Connected Mobile Experiences Privilege Escalation Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cmxapi-kskwcmfp | Cisco Connected Mobile Experiences User Enumeration Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-cmxapi-KsKwCmfp | Cisco Connected Mobile Experiences User Enumeration Vulnerability | 2021-01-13T16:00:00+00:00 | 2021-01-13T16:00:00+00:00 |
| cisco-sa-20191112-asa-ftd-lua-rce | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Code Execution Vulnerability | 2019-11-12T13:15:00+00:00 | 2021-01-11T19:14:20+00:00 |
| cisco-sa-cedge-filt-bypass-y6wzmqm4 | Cisco SD-WAN Software Packet Filtering Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-12-14T21:43:02+00:00 |
| cisco-sa-cedge-filt-bypass-Y6wZMqm4 | Cisco SD-WAN Software Packet Filtering Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-12-14T21:43:02+00:00 |
| cisco-sa-webex-auth-token-3vg57a5r | Cisco Webex Meetings and Cisco Webex Meetings Server Ghost Join Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-12-10T16:10:07+00:00 |
| cisco-sa-webex-auth-token-3vg57A5r | Cisco Webex Meetings and Cisco Webex Meetings Server Ghost Join Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-12-10T16:10:07+00:00 |
| cisco-sa-jabber-zktzjpgo | Cisco Jabber Desktop and Mobile Client Software Vulnerabilities | 2020-12-10T16:00:00+00:00 | 2020-12-10T16:00:00+00:00 |
| cisco-sa-jabber-ZktzjpgO | Cisco Jabber Desktop and Mobile Client Software Vulnerabilities | 2020-12-10T16:00:00+00:00 | 2020-12-10T16:00:00+00:00 |
| cisco-sa-ios-profinet-dos-65qyg3w5 | Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-12-09T15:23:48+00:00 |
| cisco-sa-ios-profinet-dos-65qYG3W5 | Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-12-09T15:23:48+00:00 |
| cisco-sa-profinet-j9qmchpb | Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-12-09T15:09:18+00:00 |
| cisco-sa-profinet-J9QMCHPB | Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-12-09T15:09:18+00:00 |
| cisco-sa-iosxr-pxe-unsign-code-exec-qaa78fd2 | Cisco IOS XR Software Enhanced Preboot eXecution Environment Unsigned Code Execution Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-12-01T17:50:58+00:00 |
| cisco-sa-iosxr-pxe-unsign-code-exec-qAa78fD2 | Cisco IOS XR Software Enhanced Preboot eXecution Environment Unsigned Code Execution Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-12-01T17:50:58+00:00 |
| cisco-sa-webex-info-leak-phpzb3sg | Cisco Webex Meetings and Cisco Webex Meetings Server Unauthorized Audio Information Exposure Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-23T21:59:36+00:00 |
| cisco-sa-webex-info-leak-PhpzB3sG | Cisco Webex Meetings and Cisco Webex Meetings Server Unauthorized Audio Information Exposure Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-23T21:59:36+00:00 |
| cisco-sa-webex-infodisc-4tvqzn4 | Cisco Webex Meetings and Cisco Webex Meetings Server Information Disclosure Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-23T21:59:11+00:00 |
| cisco-sa-webex-infodisc-4tvQzn4 | Cisco Webex Meetings and Cisco Webex Meetings Server Information Disclosure Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-23T21:59:11+00:00 |
| cisco-sa-csm-path-trav-ngernqgr | Cisco Security Manager Path Traversal Vulnerability | 2020-11-16T23:00:00+00:00 | 2020-11-20T17:49:26+00:00 |
| cisco-sa-csm-path-trav-NgeRnqgR | Cisco Security Manager Path Traversal Vulnerability | 2020-11-16T23:00:00+00:00 | 2020-11-20T17:49:26+00:00 |
| cisco-sa-webex-meetings-xss-mx56prer | Cisco Webex Meetings API Cross-Site Scripting Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38723 | LoongArch: BPF: Fix jump offset calculation in tailcall | 2025-09-02T00:00:00.000Z | 2025-09-06T01:01:32.000Z |
| msrc_cve-2025-38688 | iommufd: Prevent ALIGN() overflow | 2025-09-02T00:00:00.000Z | 2025-09-06T01:01:17.000Z |
| msrc_cve-2025-53791 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 2025-09-09T07:00:00.000Z | 2025-09-05T07:00:00.000Z |
| msrc_cve-2025-7039 | Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file() | 2025-09-02T00:00:00.000Z | 2025-09-05T01:05:05.000Z |
| msrc_cve-2024-45778 | Grub2: fs/bfs: integer overflow in the bfs parser. | 2025-03-02T00:00:00.000Z | 2025-09-04T08:11:42.000Z |
| msrc_cve-2025-0685 | Grub2: jfs: integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data | 2025-03-02T00:00:00.000Z | 2025-09-04T08:05:32.000Z |
| msrc_cve-2025-0684 | Grub2: reiserfs: integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading data | 2025-03-02T00:00:00.000Z | 2025-09-04T07:58:23.000Z |
| msrc_cve-2025-0686 | Grub2: romfs: integer overflow when handling symlinks may lead to heap based out-of-bounds write when reading dat | 2025-03-02T00:00:00.000Z | 2025-09-04T07:49:23.000Z |
| msrc_cve-2025-0678 | Grub2: squash4: integer overflow may lead to heap based out-of-bounds write when reading data | 2025-03-02T00:00:00.000Z | 2025-09-04T07:43:19.000Z |
| msrc_cve-2024-45782 | Grub2: fs/hfs: strcpy() using the volume name (fs/hfs.c:382) | 2025-03-02T00:00:00.000Z | 2025-09-04T07:36:59.000Z |
| msrc_cve-2024-36921 | wifi: iwlwifi: mvm: guard against invalid STA ID on removal | 2024-05-02T07:00:00.000Z | 2025-09-04T07:03:47.000Z |
| msrc_cve-2025-55244 | Azure Bot Service Elevation of Privilege Vulnerability | 2025-09-09T07:00:00.000Z | 2025-09-04T07:00:00.000Z |
| msrc_cve-2025-55242 | Xbox Certification Bug Copilot Djando Information Disclosure Vulnerability | 2025-09-09T07:00:00.000Z | 2025-09-04T07:00:00.000Z |
| msrc_cve-2025-55238 | Dynamics 365 FastTrack Implementation Assets Information Disclosure Vulnerability | 2025-09-09T07:00:00.000Z | 2025-09-04T07:00:00.000Z |
| msrc_cve-2025-54914 | Azure Networking Elevation of Privilege Vulnerability | 2025-09-09T07:00:00.000Z | 2025-09-04T07:00:00.000Z |
| msrc_cve-2025-1125 | Grub2: fs/hfs: integer overflow may lead to heap based out-of-bounds write | 2025-03-02T00:00:00.000Z | 2025-09-04T06:54:25.000Z |
| msrc_cve-2025-0689 | Grub2: udf: heap based buffer overflow in grub_udf_read_block() may lead to arbitrary code execution | 2025-03-02T00:00:00.000Z | 2025-09-04T06:48:57.000Z |
| msrc_cve-2024-45779 | Grub2: fs/bfs: integer overflow leads to heap oob read in the bfs parser | 2025-03-02T00:00:00.000Z | 2025-09-04T06:42:54.000Z |
| msrc_cve-2024-45780 | Grub2: fs/tar: integer overflow causes heap oob write | 2025-03-02T00:00:00.000Z | 2025-09-04T06:35:46.000Z |
| msrc_cve-2025-40014 | objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() | 2025-04-02T00:00:00.000Z | 2025-09-04T06:32:32.000Z |
| msrc_cve-2025-22037 | ksmbd: fix null pointer dereference in alloc_preauth_hash() | 2025-04-02T00:00:00.000Z | 2025-09-04T06:28:32.000Z |
| msrc_cve-2024-0741 | An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 122, Firefox ESR < 115.7, and Thunderbird < 115.7. | 2024-01-01T08:00:00.000Z | 2025-09-04T06:10:17.000Z |
| msrc_cve-2024-42040 | Buffer Overflow vulnerability in the net/bootp.c in DENEX U-Boot from its initial commit in 2002 (3861aa5) up to today on any platform allows an attacker on the local network to leak memory from four up to 32 bytes of memory stored behind the packet to the network depending on the later use of DHCP-provided parameters via crafted DHCP responses. | 2024-08-02T00:00:00.000Z | 2025-09-04T05:46:46.000Z |
| msrc_cve-2019-14200 | An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply. | 2019-07-02T00:00:00.000Z | 2025-09-04T05:40:11.000Z |
| msrc_cve-2025-37925 | jfs: reject on-disk inodes of an unsupported type | 2025-04-02T00:00:00.000Z | 2025-09-04T05:38:21.000Z |
| msrc_cve-2024-0584 | Rejected reason: Do not use this CVE as it is duplicate of CVE-2023-6932 | 2024-01-01T08:00:00.000Z | 2025-09-04T05:37:15.000Z |
| msrc_cve-2019-14198 | An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv3 case. | 2019-07-02T00:00:00.000Z | 2025-09-04T05:33:49.000Z |
| msrc_cve-2022-30790 | Das U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2022-30552. | 2022-06-02T00:00:00.000Z | 2025-09-04T05:27:36.000Z |
| msrc_cve-2023-29403 | Unsafe behavior in setuid/setgid binaries in runtime | 2023-06-01T07:00:00.000Z | 2025-09-04T05:23:28.000Z |
| msrc_cve-2025-50182 | urllib3 does not control redirects in browsers and Node.js | 2025-06-02T00:00:00.000Z | 2025-09-04T05:22:54.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14082-1 | python311-3.11.9-3.1 on GA media | 2024-06-28T00:00:00Z | 2024-06-28T00:00:00Z |
| opensuse-su-2024:14081-1 | containerd-1.7.17-2.1 on GA media | 2024-06-28T00:00:00Z | 2024-06-28T00:00:00Z |
| opensuse-su-2024:14080-1 | squid-6.10-1.1 on GA media | 2024-06-27T00:00:00Z | 2024-06-27T00:00:00Z |
| opensuse-su-2024:14079-1 | python39-3.9.19-3.1 on GA media | 2024-06-27T00:00:00Z | 2024-06-27T00:00:00Z |
| opensuse-su-2024:14078-1 | python38-3.8.19-4.1 on GA media | 2024-06-27T00:00:00Z | 2024-06-27T00:00:00Z |
| opensuse-su-2024:14077-1 | helmfile-0.166.0-1.1 on GA media | 2024-06-27T00:00:00Z | 2024-06-27T00:00:00Z |
| opensuse-su-2024:14076-1 | traefik2-2.11.5-1.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14075-1 | ruby3.3-rubygem-sprockets-3.7-3.7.3-1.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14074-1 | ruby3.3-rubygem-rails-7.0-7.0.8.4-1.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14073-1 | ruby3.3-rubygem-http-cookie-1.0.6-1.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14072-1 | ruby3.3-rubygem-fluentd-1.17.0-1.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14071-1 | ruby3.3-rubygem-activesupport-7.0-7.0.8.4-1.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14070-1 | ruby3.3-rubygem-activestorage-7.0-7.0.8.4-1.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14069-1 | ruby3.3-rubygem-activerecord-7.0-7.0.8.4-1.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14068-1 | ruby3.3-rubygem-actiontext-7.0-7.0.8.4-1.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14067-1 | ruby3.3-rubygem-actionpack-7.0-7.0.8.4-1.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14066-1 | python310-3.10.14-2.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14065-1 | python310-django-allauth-0.63.3-1.1 on GA media | 2024-06-24T00:00:00Z | 2024-06-24T00:00:00Z |
| opensuse-su-2024:14064-1 | python39-3.9.19-2.1 on GA media | 2024-06-22T00:00:00Z | 2024-06-22T00:00:00Z |
| opensuse-su-2024:14063-1 | python38-3.8.19-3.1 on GA media | 2024-06-22T00:00:00Z | 2024-06-22T00:00:00Z |
| opensuse-su-2024:14062-1 | python310-dnspython-2.6.1-1.1 on GA media | 2024-06-21T00:00:00Z | 2024-06-21T00:00:00Z |
| opensuse-su-2024:14061-1 | perl-DBI-1.643-4.1 on GA media | 2024-06-21T00:00:00Z | 2024-06-21T00:00:00Z |
| opensuse-su-2024:14060-1 | gnome-settings-daemon-46.0-5.1 on GA media | 2024-06-21T00:00:00Z | 2024-06-21T00:00:00Z |
| opensuse-su-2024:14059-1 | singularity-ce-4.1.3-1.1 on GA media | 2024-06-20T00:00:00Z | 2024-06-20T00:00:00Z |
| opensuse-su-2024:14058-1 | kubevirt-container-disk-1.2.2-2.1 on GA media | 2024-06-20T00:00:00Z | 2024-06-20T00:00:00Z |
| opensuse-su-2024:14057-1 | sngrep-1.8.1-2.1 on GA media | 2024-06-19T00:00:00Z | 2024-06-19T00:00:00Z |
| opensuse-su-2024:0168-1 | Security update for gdcm | 2024-06-18T16:32:22Z | 2024-06-18T16:32:22Z |
| opensuse-su-2024:0167-1 | Security update for gdcm | 2024-06-18T16:32:20Z | 2024-06-18T16:32:20Z |
| opensuse-su-2024:14056-1 | wget-1.24.5-2.1 on GA media | 2024-06-18T00:00:00Z | 2024-06-18T00:00:00Z |
| opensuse-su-2024:14055-1 | python310-urllib3-2.1.0-3.1 on GA media | 2024-06-18T00:00:00Z | 2024-06-18T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-helm-2024-25620 | Dependency management path traversal in helm | 2024-03-31T18:18:57.477Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2023-25165 | getHostByName Function Information Disclosure | 2024-03-06T10:53:11.303Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2022-36055 | Denial of service in Helm | 2024-03-06T10:53:21.994Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2022-36049 | Flux2 Helm Controller denial of service | 2024-03-06T10:53:31.970Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2022-23526 | Helm contains Denial of service through schema file | 2024-03-06T10:53:44.587Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2022-23525 | Helm vulnerable to Denial of service via NULL Pointer Dereference | 2024-03-06T10:53:55.402Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2022-23524 | Helm vulnerable to Denial of service through string value parsing | 2024-03-06T10:54:06.367Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2021-32690 | Repository credentials passed to alternate domain | 2024-03-06T10:54:16.903Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2021-21303 | Injection attack in Helm | 2024-03-06T10:54:27.370Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2020-4053 | Path Traversal in Helm Plugin Archive | 2024-03-06T10:54:38.488Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2020-15186 | Improper sanitization of plugin names in Helm | 2024-03-06T10:54:59.291Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2020-15185 | Duplicated chart entries in Helm | 2024-03-06T10:55:08.169Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2020-15184 | Aliases are never checked in Helm | 2024-03-06T10:55:17.666Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2020-11013 | lookup Function Information Discolosure in Helm | 2024-03-06T10:55:27.687Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2024-22278 | Harbor fails to validate the user permissions when updating project configurations | 2024-08-10T07:20:13.895Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2024-22244 | Harbor Open Redirect URL | 2025-02-27T07:09:50.441Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2023-20902 | Timing attack risk in Harbor | 2024-03-06T10:53:13.485Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2022-31671 | Harbor fails to validate the user permissions when reading and updating job execution logs through the P2P preheat execution logs | 2024-11-20T07:10:37.789Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2022-31670 | Harbor fails to validate the user permissions when updating tag retention policies | 2024-11-20T07:10:45.197Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2022-31669 | Harbor fails to validate the user permissions when updating tag immutability policies | 2024-11-20T07:10:52.890Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2022-31668 | User permission validation failure and disclosure of P2P preheat execution logs | 2024-11-20T07:10:59.480Z | 2025-05-20T10:02:07.006Z |
| bit-harbor-2022-31667 | Harbor fails to validate the user permissions when updating a robot account | 2024-11-20T07:11:07.078Z | 2025-05-20T10:02:07.006Z |
| bit-handlebars-2021-32820 | File disclosure in Express Handlebars | 2024-03-06T10:52:54.181Z | 2025-05-20T10:02:07.006Z |
| bit-handlebars-2021-32817 | File disclosure in express-hbs | 2024-03-06T10:53:03.974Z | 2025-05-20T10:02:07.006Z |
| bit-gulp-2020-28469 | Regular Expression Denial of Service (ReDoS) | 2024-03-06T10:53:11.461Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2024-9264 | Grafana SQL Expressions allow for remote code execution | 2024-10-22T07:09:52.003Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2024-8118 | Grafana alerting wrong permission on datasource rule write endpoint | 2025-04-14T11:12:21.847Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2024-1442 | User with permissions to create a data source can CRUD all data sources | 2024-03-12T08:24:28.608Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2024-1313 | Users outside an organization can delete a snapshot with its key | 2024-03-28T07:19:10.064Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2023-5122 | SSRF in CSV Datasource Plugin | 2024-10-24T07:10:55.187Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202309-0933 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has be… | 2024-05-17T19:18:29.283000Z |
| var-202405-0649 | Beijing Yakong Technology Development Co., Ltd. is a high-tech enterprise of industrial a… | 2024-05-17T19:18:28.895000Z |
| var-202404-2194 | IBM MQ Appliance 9.3 CD and LTS are vulnerable to a heap-based buffer overflow, caused by… | 2024-05-16T22:47:05.065000Z |
| var-199809-0010 | iChat ROOMS Webserver allows remote attackers to read arbitrary files via a .. (dot dot) … | 2024-05-15T22:56:45.437000Z |
| var-199804-0007 | Buffer overflow in Apple AppleShare Mail Server 5.0.3 on MacOS 8.1 and earlier allows a r… | 2024-05-15T22:53:49.707000Z |
| var-199804-0010 | Buffer overflow in SMTP HELO command in Sendmail allows a remote attacker to hide activit… | 2024-05-15T22:53:31.351000Z |
| var-199912-0023 | lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows loc… | 2024-05-15T22:38:32.874000Z |
| var-199807-0030 | By design, the "established" command on the Cisco PIX firewall allows connections from on… | 2024-05-14T22:59:38.281000Z |
| var-200004-0053 | Buffer overflow in WebObjects.exe in the WebObjects Developer 4.5 package allows remote a… | 2024-05-14T22:59:17.344000Z |
| var-199911-0013 | Idle locking function in MacOS 9 allows local attackers to bypass the password protection… | 2024-05-14T22:59:17.410000Z |
| var-199907-0037 | MacOS uses weak encryption for passwords that are stored in the Users & Groups Data File.… | 2024-05-14T22:57:55.325000Z |
| var-202306-1109 | A vulnerability has been identified in SIMATIC PCS 7 (All versions < V9.1 SP2 UC04), SIMA… | 2024-05-14T22:57:37.290000Z |
| var-199905-0009 | Control Panel "Password Security" option for Apple Powerbooks allows attackers with physi… | 2024-05-14T22:57:34.106000Z |
| var-199910-0007 | Idle locking function in MacOS 9 allows local users to bypass the password protection of … | 2024-05-14T22:52:35.479000Z |
| var-199912-0159 | Macintosh systems generate large ICMP datagrams in response to malformed datagrams, allow… | 2024-05-14T22:51:21.274000Z |
| var-202004-0712 | A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: EK-ER… | 2024-05-14T22:36:22.729000Z |
| var-202312-0236 | A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC P… | 2024-05-14T22:20:44.510000Z |
| var-202210-0537 | A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE M… | 2024-05-14T22:02:48.955000Z |
| var-202312-0234 | A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC P… | 2024-05-14T21:47:37.301000Z |
| var-202212-1301 | A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.50), S… | 2024-05-14T21:36:09.623000Z |
| var-202312-0237 | A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC P… | 2024-05-14T21:07:38.158000Z |
| var-202304-0737 | A vulnerability has been identified in SIPROTEC 5 6MD85 (CP300) (All versions >= V7.80 < … | 2024-05-14T20:45:05.054000Z |
| var-202312-0235 | A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC P… | 2024-05-14T20:30:13.048000Z |
| var-202312-0238 | A vulnerability has been identified in Opcenter Quality (All versions < V2312), SIMATIC P… | 2024-05-14T19:25:50.562000Z |
| var-202312-1262 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2024-05-12T23:08:54.835000Z |
| var-199808-0007 | Cisco PIX firewall manager (PFM) on Windows NT allows attackers to connect to port 8080 o… | 2024-05-12T03:50:13.318000Z |
| var-199507-0001 | In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control li… | 2024-05-12T03:50:13.380000Z |
| var-202312-2148 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2024-05-12T03:49:21.253000Z |
| var-202312-1439 | TOTOlink EX1800T V9.1.0cu.2112_B20220316 is vulnerable to an unauthorized arbitrary comma… | 2024-05-12T03:47:51.622000Z |
| var-202312-0767 | TOTOlink EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2024-05-12T03:47:51.665000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2013-000068 | AQUOS PhotoPlayer HN-PP150 vulnerable to denial-of-service (DoS) | 2013-07-11T15:39+09:00 | 2013-07-16T14:21+09:00 |
| jvndb-2013-000065 | EC-CUBE vulnerable to directory traversal | 2013-06-27T14:33+09:00 | 2013-07-02T16:15+09:00 |
| jvndb-2013-000064 | EC-CUBE vulnerable to cross-site scripting | 2013-06-27T14:31+09:00 | 2013-07-02T16:10+09:00 |
| jvndb-2013-000063 | EC-CUBE vulnerable to cross-site scripting | 2013-06-27T14:31+09:00 | 2013-07-02T16:06+09:00 |
| jvndb-2013-000062 | EC-CUBE vulnerable to code injection | 2013-06-27T14:29+09:00 | 2013-07-02T16:01+09:00 |
| jvndb-2013-000061 | EC-CUBE vulnerable to directory traversal | 2013-06-27T14:29+09:00 | 2013-07-02T15:57+09:00 |
| jvndb-2013-000067 | CLIP-MAIL vulnerable to cross-site scripting | 2013-06-27T14:35+09:00 | 2013-07-02T15:52+09:00 |
| jvndb-2013-000066 | POST-MAIL vulnerable to cross-site scripting | 2013-06-27T14:38+09:00 | 2013-07-02T15:47+09:00 |
| jvndb-2013-000058 | Ichitaro series vulnerable to arbitrary code execution | 2013-06-18T15:17+09:00 | 2013-06-26T14:49+09:00 |
| jvndb-2013-000059 | Cybozu Live for Android vulnerable to arbitrary Java method execution | 2013-06-18T15:19+09:00 | 2013-06-26T14:46+09:00 |
| jvndb-2013-000060 | Cybozu Live for Android vulnerable in the WebView class | 2013-06-18T15:20+09:00 | 2013-06-26T14:43+09:00 |
| jvndb-2012-000080 | Opera address bar spoofing vulnerability | 2012-08-30T14:00+09:00 | 2013-06-26T13:48+09:00 |
| jvndb-2013-000034 | Multiple Cybozu products vulnerable to cross-site request forgery | 2013-04-15T17:08+09:00 | 2013-06-25T18:36+09:00 |
| jvndb-2013-000031 | Active! mail vulnerable to information disclosure | 2013-04-04T14:43+09:00 | 2013-06-25T18:30+09:00 |
| jvndb-2013-000024 | Multiple NEC mobile routers vulnerable to cross-site request forgery | 2013-03-19T13:45+09:00 | 2013-06-25T18:19+09:00 |
| jvndb-2013-000023 | VxWorks Web Server vulnerable to denial-of-service (DoS) | 2013-03-18T14:43+09:00 | 2013-06-25T18:15+09:00 |
| jvndb-2013-000022 | VxWorks WebCLI vulnerable to denial-of-service (DoS) | 2013-03-18T14:40+09:00 | 2013-06-25T18:10+09:00 |
| jvndb-2013-000021 | VxWorks SSH server (IPSSH) denial-of-service (DoS) vulnerability | 2013-03-18T14:38+09:00 | 2013-06-25T18:06+09:00 |
| jvndb-2013-000020 | VxWorks SSH server (IPSSH) denial-of-service (DoS) vulnerability | 2013-03-18T14:30+09:00 | 2013-06-25T18:01+09:00 |
| jvndb-2013-000019 | VxWorks SSH server (IPSSH) denial-of-service (DoS) vulnerability | 2013-03-18T14:32+09:00 | 2013-06-25T17:57+09:00 |
| jvndb-2013-000018 | VxWorks SSH server (IPSSH) denial-of-service (DoS) vulnerability | 2013-03-18T14:33+09:00 | 2013-06-25T17:54+09:00 |
| jvndb-2013-003074 | Cross-site Scripting Vulnerability in Hitachi Command Suite Products | 2013-06-20T14:37+09:00 | 2013-06-20T14:37+09:00 |
| jvndb-2013-003073 | Vulnerability in JP1/HIBUN Advanced Edition Information Cypher Removable Media Encryption | 2013-06-20T14:24+09:00 | 2013-06-20T14:24+09:00 |
| jvndb-2013-000039 | Wi-Fi Spot Configuration Software vulnerability in the connection process | 2013-05-15T14:25+09:00 | 2013-06-19T09:58+09:00 |
| jvndb-2013-000038 | OpenPNE vulnerable to cross-site scripting | 2013-05-13T13:39+09:00 | 2013-06-19T09:56+09:00 |
| jvndb-2013-000056 | Galapagos Browser vulnerable in the WebView class | 2013-06-11T13:48+09:00 | 2013-06-18T17:55+09:00 |
| jvndb-2013-000055 | Angel Browser vulnerable in the WebView class | 2013-06-11T13:40+09:00 | 2013-06-18T17:52+09:00 |
| jvndb-2013-000057 | Orchard vulnerable to cross-site scripting | 2013-06-13T13:49+09:00 | 2013-06-17T12:01+09:00 |
| jvndb-2013-000054 | Pizza Hut Japan Official Order App for Android. contains an issue where it fails to verify SSL server certificates | 2013-06-07T15:03+09:00 | 2013-06-07T15:03+09:00 |
| jvndb-2013-000053 | Internet Explorer vulnerable to information disclosure | 2013-06-07T13:59+09:00 | 2013-06-07T13:59+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20453-1 | Security update for libsoup | 2025-06-28T05:47:32Z | 2025-06-28T05:47:32Z |
| suse-su-2025:02162-1 | Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 2025-06-27T17:03:42Z | 2025-06-27T17:03:42Z |
| suse-su-2025:02161-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) | 2025-06-27T16:33:31Z | 2025-06-27T16:33:31Z |
| suse-su-2025:02159-1 | Security update for apache-commons-fileupload | 2025-06-27T14:56:05Z | 2025-06-27T14:56:05Z |
| suse-su-2025:02158-1 | Security update for MozillaThunderbird | 2025-06-27T14:51:14Z | 2025-06-27T14:51:14Z |
| suse-su-2025:02157-1 | Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) | 2025-06-27T13:04:00Z | 2025-06-27T13:04:00Z |
| suse-su-2025:01456-2 | Security update for sqlite3 | 2025-06-27T12:17:36Z | 2025-06-27T12:17:36Z |
| suse-su-2025:01455-1 | Security update for sqlite3 | 2025-06-27T12:16:18Z | 2025-06-27T12:16:18Z |
| suse-su-2025:02156-1 | Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5) | 2025-06-27T12:03:49Z | 2025-06-27T12:03:49Z |
| suse-su-2025:02155-1 | Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP4) | 2025-06-27T11:33:40Z | 2025-06-27T11:33:40Z |
| suse-su-2025:02154-1 | Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4) | 2025-06-27T09:03:42Z | 2025-06-27T09:03:42Z |
| suse-su-2025:02153-1 | Security update for yelp-xsl | 2025-06-27T07:51:21Z | 2025-06-27T07:51:21Z |
| suse-su-2025:02150-1 | Security update for google-osconfig-agent | 2025-06-27T05:22:19Z | 2025-06-27T05:22:19Z |
| suse-su-2025:02149-1 | Security update for google-osconfig-agent | 2025-06-27T05:22:03Z | 2025-06-27T05:22:03Z |
| suse-su-2025:02146-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) | 2025-06-27T04:04:07Z | 2025-06-27T04:04:07Z |
| suse-su-2025:02145-1 | Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) | 2025-06-27T04:04:00Z | 2025-06-27T04:04:00Z |
| suse-su-2025:02144-1 | Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) | 2025-06-26T21:07:40Z | 2025-06-26T21:07:40Z |
| suse-su-2025:02142-1 | Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) | 2025-06-26T18:33:39Z | 2025-06-26T18:33:39Z |
| suse-su-2025:02140-1 | Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3) | 2025-06-26T16:33:38Z | 2025-06-26T16:33:38Z |
| suse-su-2025:02139-1 | Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 2025-06-26T16:03:55Z | 2025-06-26T16:03:55Z |
| suse-su-2025:02138-1 | Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) | 2025-06-26T15:34:35Z | 2025-06-26T15:34:35Z |
| suse-su-2025:02137-1 | Security update for the Linux Kernel (Live Patch 67 for SLE 12 SP5) | 2025-06-26T15:34:27Z | 2025-06-26T15:34:27Z |
| suse-su-2025:02136-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | 2025-06-26T14:03:45Z | 2025-06-26T14:03:45Z |
| suse-su-2025:02135-1 | Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5) | 2025-06-26T13:03:44Z | 2025-06-26T13:03:44Z |
| suse-su-2025:02134-1 | Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4) | 2025-06-26T12:33:34Z | 2025-06-26T12:33:34Z |
| suse-su-2025:02132-1 | Security update for the Linux Kernel (Live Patch 63 for SLE 12 SP5) | 2025-06-26T11:33:30Z | 2025-06-26T11:33:30Z |
| suse-su-2025:02131-1 | Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) | 2025-06-26T11:03:53Z | 2025-06-26T11:03:53Z |
| suse-su-2025:02128-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) | 2025-06-26T09:04:26Z | 2025-06-26T09:04:26Z |
| suse-su-2025:02127-1 | Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) | 2025-06-26T09:04:15Z | 2025-06-26T09:04:15Z |
| suse-su-2025:02126-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 2025-06-26T09:04:06Z | 2025-06-26T09:04:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-27648 | IPFire跨站脚本漏洞(CNVD-2025-27648) | 2025-10-31 | 2025-11-11 |
| cnvd-2025-27647 | IPFire跨站脚本漏洞(CNVD-2025-27647) | 2025-10-31 | 2025-11-11 |
| cnvd-2025-27646 | IPFire跨站脚本漏洞(CNVD-2025-27646) | 2025-10-31 | 2025-11-11 |
| cnvd-2025-27645 | IPFire跨站脚本漏洞(CNVD-2025-27645) | 2025-10-31 | 2025-11-11 |
| cnvd-2025-27644 | IPFire跨站脚本漏洞(CNVD-2025-27644) | 2025-10-31 | 2025-11-11 |
| cnvd-2025-27643 | IPFire跨站脚本漏洞(CNVD-2025-27643) | 2025-10-31 | 2025-11-11 |
| cnvd-2025-27637 | IPFire跨站脚本漏洞(CNVD-2025-27637) | 2025-10-31 | 2025-11-11 |
| cnvd-2025-27636 | IPFire跨站脚本漏洞(CNVD-2025-27636) | 2025-10-31 | 2025-11-11 |
| cnvd-2025-27635 | IPFire跨站脚本漏洞(CNVD-2025-27635) | 2025-10-31 | 2025-11-11 |
| cnvd-2025-27634 | IPFire BE_NAME参数命令注入漏洞 | 2025-10-31 | 2025-11-11 |
| cnvd-2025-27592 | Huawei HarmonyOS和EMUI访问权限验证漏洞 | 2024-09-10 | 2025-11-11 |
| cnvd-2025-27594 | Simple forum forum_viewfile.php文件SQL注入漏洞 | 2025-07-07 | 2025-11-10 |
| cnvd-2025-27593 | Simple forum forum_edit.php文件SQL注入漏洞 | 2025-07-07 | 2025-11-10 |
| cnvd-2025-27591 | News Portal硬编码漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27590 | News Portal settings.py文件信息泄露漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27589 | Dell Storage Manager XML外部实体引用不当限制漏洞 | 2025-10-29 | 2025-11-10 |
| cnvd-2025-27588 | Dell Storage Manager不当认证漏洞 | 2025-10-29 | 2025-11-10 |
| cnvd-2025-27587 | DELL SupportAssist OS Recovery信息泄露漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27586 | Dell Unity操作系统命令注入漏洞(CNVD-2025-27586) | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27585 | Dell Unity操作系统命令注入漏洞(CNVD-2025-27585) | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27584 | Dell Unity操作系统命令注入漏洞(CNVD-2025-27584) | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27583 | Dell Unity操作系统命令注入漏洞(CNVD-2025-27583) | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27582 | Dell Unity操作系统命令注入漏洞(CNVD-2025-27582) | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27581 | Dell Unity操作系统命令注入漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27580 | Dell Secure Connect Gateway相对路径遍历漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27579 | DELL Secure Connect Gateway Policy Manager跨站脚本漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27578 | TOTOLINK X6000R sub_417D74函数命令注入漏洞 | 2025-09-18 | 2025-11-10 |
| cnvd-2025-27577 | TOTOLINK X6000R输入验证不当漏洞 | 2025-09-25 | 2025-11-10 |
| cnvd-2025-27576 | TOTOLINK A3300R setDdnsCfg函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27575 | TOTOLINK A3300R setScheduleCfg函数堆栈缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0099 | Multiples vulnérabilités dans les produits F5 | 2025-02-06T00:00:00.000000 | 2025-02-06T00:00:00.000000 |
| CERTFR-2025-AVI-0100 | Multiples vulnérabilités dans les produits Cisco | 2025-02-06T00:00:00.000000 | 2025-02-06T00:00:00.000000 |
| CERTFR-2025-AVI-0099 | Multiples vulnérabilités dans les produits F5 | 2025-02-06T00:00:00.000000 | 2025-02-06T00:00:00.000000 |
| certfr-2025-avi-0098 | Multiples vulnérabilités dans les produits Curl | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0097 | Multiples vulnérabilités dans les produits Mozilla | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0096 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0095 | Multiples vulnérabilités dans Google Chrome | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0094 | Vulnérabilité dans les produits Veeam | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0093 | Vulnérabilité dans Google Pixel | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| CERTFR-2025-AVI-0098 | Multiples vulnérabilités dans les produits Curl | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| CERTFR-2025-AVI-0097 | Multiples vulnérabilités dans les produits Mozilla | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| CERTFR-2025-AVI-0096 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| CERTFR-2025-AVI-0095 | Multiples vulnérabilités dans Google Chrome | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| CERTFR-2025-AVI-0094 | Vulnérabilité dans les produits Veeam | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| CERTFR-2025-AVI-0093 | Vulnérabilité dans Google Pixel | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0092 | Multiples vulnérabilités dans ISC BIND | 2025-02-04T00:00:00.000000 | 2025-02-04T00:00:00.000000 |
| certfr-2025-avi-0091 | Multiples vulnérabilités dans Google Android | 2025-02-04T00:00:00.000000 | 2025-02-04T00:00:00.000000 |
| CERTFR-2025-AVI-0092 | Multiples vulnérabilités dans ISC BIND | 2025-02-04T00:00:00.000000 | 2025-02-04T00:00:00.000000 |
| CERTFR-2025-AVI-0091 | Multiples vulnérabilités dans Google Android | 2025-02-04T00:00:00.000000 | 2025-02-04T00:00:00.000000 |
| certfr-2025-avi-0090 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2025-02-03T00:00:00.000000 | 2025-02-03T00:00:00.000000 |
| certfr-2025-avi-0089 | Vulnérabilité dans Python | 2025-02-03T00:00:00.000000 | 2025-02-03T00:00:00.000000 |
| CERTFR-2025-AVI-0090 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2025-02-03T00:00:00.000000 | 2025-02-03T00:00:00.000000 |
| CERTFR-2025-AVI-0089 | Vulnérabilité dans Python | 2025-02-03T00:00:00.000000 | 2025-02-03T00:00:00.000000 |
| certfr-2025-avi-0088 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0087 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0086 | Multiples vulnérabilités dans les produits IBM | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0085 | Multiples vulnérabilités dans les produits VMware | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0084 | Vulnérabilité dans Microsoft Edge | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0083 | Vulnérabilité dans Apple GarageBand | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2024-avi-0601 | Multiples vulnérabilités dans les produits Mitel | 2024-07-18T00:00:00.000000 | 2025-01-31T00:00:00.000000 |